==========================================================================
Ubuntu Security Notice USN-2744-1
September 24, 2015
apport vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Apport could be made to crash or overwrite files as an administrator.
Software Description:
– apport: automatically generate crash reports for debugging
Details:
Halfdog discovered that Apport incorrectly handled kernel crash dump files.
A local attacker could use this issue to cause a denial of service, or
possibly elevate privileges. The default symlink protections for affected
releases should reduce the vulnerability to a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
apport 2.17.2-0ubuntu1.5
Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.15
Ubuntu 12.04 LTS:
apport 2.0.1-0ubuntu17.10
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2744-1
CVE-2015-1338
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.17.2-0ubuntu1.5
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.15
https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.10
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJWA+uLAAoJEGVp2FWnRL6T6K0QAI1icocP/cPSeRBQdd72HIzN
aNrwiaAurBeoohNev1G42xUaN4X48dL8hH0amqFwkYfXdGlKsxtOjKYCt/nJdEE1
KeyTnPpZjl9laxuJqaRkzBYFSYdblzxXfbMK+VbN4jEfWwtbeMd4WGtyfF5/VhWl
5PWlMxJl/R4PnunD48hzei0Nm0ez9P0IjR/otVrNZ/DZSaVX71j66c/Kzp7Zsek1
YroP9lfdsSRM9RBnE7swxX4Plb0zZf6+WH5vDPpxM9yLCIDhZOct8MwRo/F7slAO
uC8vKR6VPciOWpsgyLOa4mewkzDerQOxXJ6EXFAIwtRfuo91hniwPQ7ZpG/IgMzY
YpGjZBOzNXRtpAPgZLg1ObzgR1pLrad8CAm0wHX40Vc9+DFENqQn+K2JHb4drtYx
wCePwTgk1hnyQczZhF8MWl74JOe/cuYLO2IJUozUODlq36s78F5nD0f1XDi516kX
+f1ooUJRkkxT7UkeEoHAQeXeKNsRzRBkxILFEqJGjH0dYPevCbmPJZD/NXLEjXTf
O6cX0O1XcmYHTwel3kiplm0lrbpojmbTiGqGpK/+EOzXJ/7HtZpXN6XiY0rAJp0y
VlJVEQeij+FGQOyKFFg12sE9HvrvkHo0T9+irIvcumK4kaf0wbNGNxXexasVj7wi
h0L6421todr9bolYT3K4
=3MEP
—–END PGP SIGNATURE—–
—