systemd-coredump sets the sysctl fs.suid_dumpable by default to 2 via a sysctl.d drop-in configuration file. For the kernel's builtin coredump handling this setting means that core dumps for setuid (or otherwise privileged) processes will be written to disk but will only be accessible to the root user to avoid sensitive data leaking to unprivileged user accounts. See also `man 5 proc` for the full documentation of this sysctl. https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
Created systemd tracking bugs for this issue: Affects: fedora-36 [bug 2155521] Affects: fedora-37 [bug 2155522]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0837 https://access.redhat.com/errata/RHSA-2023:0837
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0954 https://access.redhat.com/errata/RHSA-2023:0954
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-4415
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:1105 https://access.redhat.com/errata/RHSA-2024:1105