This bug was fixed in the package apport - 2.12.6-0ubuntu1 --------------- apport (2.12.6-0ubuntu1) trusty; urgency=low
* New upstream security/bug fix release: - SECURITY FIX: For setuid programs which drop their privileges after startup, make the report and core dumps owned by root, to avoid possible data disclosure. Also, change core dump files to permissions "0600". Thanks to Martin Carpenter for discovering this! (CVE-2013-1067, LP: #1242435) - sandboxutils.needed_runtime_packages(): Create cache directory for Contents.gz if missing. (LP: #933199) - apt/dpkg: Recognize options in apt sources.list. (LP: #1238620) * Move Vcs-Bzr to trusty branch. -- Martin Pitt <martin.p...@ubuntu.com> Fri, 25 Oct 2013 06:49:19 +0200 ** Changed in: apport (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1242435 Title: Desktop setuid cores readable by non-privileged user To manage notifications about this bug go to: https://bugs.launchpad.net/apport/+bug/1242435/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs