Fixed in upstream release 2.12.6: https://launchpad.net/apport/trunk/2.12.6
** Description changed: Elsewhere I have been working on a sensitive information leak via core dump generated by gcore(1). The sensitive information in question is read by a stock setuid root binary executed by a non-privileged user. On Ubuntu Desktop fs.suid_dumpable=2. Referencing https://www.kernel.org/doc/Documentation/sysctl/fs.txt: 2 - (suidsafe) - any binary which normally would not be dumped is dumped - anyway, but only if the "core_pattern" kernel sysctl is set to - either a pipe handler or a fully qualified path. (For more details - on this limitation, see CVE-2006-2451.) This mode is appropriate - when administrators are attempting to debug problems in a normal - environment, and either have a core dump pipe handler that knows - to treat privileged core dumps with care, or specific directory - defined for catching core dumps. If a core dump happens without - a pipe handler or fully qualifid path, a message will be emitted - to syslog warning about the lack of a correct setting. + anyway, but only if the "core_pattern" kernel sysctl is set to + either a pipe handler or a fully qualified path. (For more details + on this limitation, see CVE-2006-2451.) This mode is appropriate + when administrators are attempting to debug problems in a normal + environment, and either have a core dump pipe handler that knows + to treat privileged core dumps with care, or specific directory + defined for catching core dumps. If a core dump happens without + a pipe handler or fully qualifid path, a message will be emitted + to syslog warning about the lack of a correct setting. NB "treat privileged core dumps with care". On a stock Desktop 12.04 LTS install: - kernel.core_pattern = |/usr/share/apport/apport %p %s %c + kernel.core_pattern = |/usr/share/apport/apport %p %s %c apport dutifully dumps the core and this is readable (0660, user:user) by the invoking user, whereas it should be something like 0440, root:root. I believe this to be a bug in apport. + + TRUNK FIX: http://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/2723 + Backports for older releases available as attachments here. ** Changed in: apport Status: In Progress => Fix Committed ** Changed in: apport Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1242435 Title: Desktop setuid cores readable by non-privileged user To manage notifications about this bug go to: https://bugs.launchpad.net/apport/+bug/1242435/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs