==========================================================================
Ubuntu Security Notice USN-3480-2
November 20, 2017
apport regressions
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.10
– Ubuntu 17.04
– Ubuntu 16.04 LTS
Summary:
USN-3480-1 introduced regressions in Apport.
Software Description:
– apport: automatically generate crash reports for debugging
Details:
USN-3480-1 fixed vulnerabilities in Apport. The fix for CVE-2017-14177
introduced a regression in the ability to handle crashes for users that
configured their systems to use the Upstart init system in Ubuntu 16.04
LTS and Ubuntu 17.04. The fix for CVE-2017-14180 temporarily disabled
crash forwarding to containers. This update addresses the problems.
We apologize for the inconvenience.
Original advisory details:
Sander Bos discovered that Apport incorrectly handled core dumps for setuid
binaries. A local attacker could use this issue to perform a denial of service
via resource exhaustion or possibly gain root privileges. (CVE-2017-14177)
Sander Bos discovered that Apport incorrectly handled core dumps for processes
in a different PID namespace. A local attacker could use this issue to perform
a denial of service via resource exhaustion or possibly gain root privileges.
(CVE-2017-14180)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
apport 2.20.7-0ubuntu3.5
Ubuntu 17.04:
apport 2.20.4-0ubuntu4.8
Ubuntu 16.04 LTS:
apport 2.20.1-0ubuntu2.13
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3480-2
https://www.ubuntu.com/usn/usn-3480-1
https://launchpad.net/bugs/1726372, https://launchpad.net/bugs/1732518
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.7-0ubuntu3.5
https://launchpad.net/ubuntu/+source/apport/2.20.4-0ubuntu4.8
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.13
—–BEGIN PGP SIGNATURE—–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=cL/1
—–END PGP SIGNATURE—–
—