==========================================================================
Ubuntu Security Notice USN-3354-1
July 18, 2017
apport vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
An attacker could trick a user into opening a malicious .crash file
and execute arbitrary code as the user.
Software Description:
– apport: automatically generate crash reports for debugging
Details:
Felix Wilhelm discovered a path traversal vulnerability in Apport
when handling the ExecutablePath field in crash files. An attacker
could trick a user into opening a specially crafted crash file and
execute arbitrary code with the user’s privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
apport 2.20.4-0ubuntu4.5
python-apport 2.20.4-0ubuntu4.5
python3-apport 2.20.4-0ubuntu4.5
Ubuntu 16.10:
apport 2.20.3-0ubuntu8.7
python-apport 2.20.3-0ubuntu8.7
python3-apport 2.20.3-0ubuntu8.7
Ubuntu 16.04 LTS:
apport 2.20.1-0ubuntu2.10
python-apport 2.20.1-0ubuntu2.10
python3-apport 2.20.1-0ubuntu2.10
Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.25
python-apport 2.14.1-0ubuntu3.25
python3-apport 2.14.1-0ubuntu3.25
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3354-1
CVE-2017-10708
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.4-0ubuntu4.5
https://launchpad.net/ubuntu/+source/apport/2.20.3-0ubuntu8.7
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.10
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.25
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=VPmA
—–END PGP SIGNATURE—–
—