Package: apport
Severity: important
Version: 2.9-1
Tags: security patch upstream

Hey Ritesh,

I just released 2.21.6. This release fixes an information disclosure
for programs which are setuid root and drop their privileges back to
the user later on. In those cases, if you run apport and enable core
dump files (with ulimit -c), these core dump files previously were
owned by the user; they should be owned by root as the program
temporarily ran with root privileges and thus might have internal
state which is not accessible to the user. This internal state is
exposed in the core dump.

Details, links to the trunk and backported patches etc. are in
https://launchpad.net/bugs/1242435 . In particular, the fix is
http://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/2723
but I suppose for experimental you might just want to update to the
2.21.6 directly?

Thanks,

Martin

-- 
Martin Pitt                        | http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to