- Ubuntu Core Development Team
- 2001. By Martin Pitt on 2015-05-13
Add test case to ensure that users cannot inject arbitrary core dump file
contents (CVE-2015-1325). This version is not affected, but having the
test will ensure that backported changes don't introduce this
vulnerability. (LP: #1453900)
- 2000. By Martin Pitt on 2015-05-13
SECURITY UPDATE: When /proc/sys/
fs/suid_ dumpable is enabled, crashing a
program that is suid root or not readable for the user would create
root-owned core files in the current directory of that program. Creating
specially crafted core files in /etc/logrotate.d or similar could then
lead to arbitrary code execution with root privileges. Now core files do
not get written for these kinds of programs, in accordance with the
intention of core(5).
Thanks to Sander Bos for discovering this issue!
(CVE-2015-1324, LP: #1452239)
- 1999. By Martin Pitt on 2015-05-08
crashes( ): Drop hardcoded /tmp/ path in do_crash(),
e_cwd() uses a different dir.
- 1997. By Martin Pitt on 2015-05-08
report.py, add_gdb_info(): Check for truncated core dumps, and set
UnreportableReason and raise an IOError on them. Handle this in
apport-retrace and whoopsie-upload-all to fail properly instead of
silently producing broken Stacktraces. (LP: #1354571)
- 1995. By Andy Whitcroft on 2014-08-06
* fix up apport reporting for linux-lts-raring kernels (LP: #1352829)
- add links for linux-lts-trusty to the package to map those to
the source_linux.py hooks.
- 1994. By Andy Whitcroft on 2014-08-06
* SECURITY UPDATE: incorrect permissions on setuid process core dumps
- use correct permissions when writing the core file in data/apport,
added test to test/test_
signal_ crashes. py.
- Thanks to Martin Pitt for the patch!
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)