You are here
Home > Preporuke > Ranjivost programskog paketa apport

Ranjivost programskog paketa apport

==========================================================================
Ubuntu Security Notice USN-2569-2
April 16, 2015

apport vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS

Summary:

Apport could be tricked into running programs as an administrator.

Software Description:
– apport: automatically generate crash reports for debugging

Details:

USN-2569-1 fixed a vulnerability in Apport. Tavis Ormandy discovered that
the fixed packages were still vulnerable to a privilege escalation attack.
This update completely disables crash report handling for containers until
a more complete solution is available.

Original advisory details:

Stéphane Graber and Tavis Ormandy independently discovered that Apport
incorrectly handled the crash reporting feature. A local attacker could use
this issue to gain elevated privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
apport 2.14.7-0ubuntu8.4

Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.10

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2569-2
http://www.ubuntu.com/usn/usn-2569-1
https://launchpad.net/bugs/1444518

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.14.7-0ubuntu8.4
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.10

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=nMU3
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivost programskog paketa ppp

Otkrivena je ranjivost u daemonu koji implementira Point-to-Point protokol, ppp, za Debian. Ranjivost je posljedica preljeva spremnika u funkciji radius...

Close