You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa apport

Sigurnosni nedostaci programskog paketa apport

==========================================================================
Ubuntu Security Notice USN-3480-3
January 03, 2018

apport regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 17.04
– Ubuntu 16.04 LTS

Summary:

USN-3480-2 introduced regressions in Apport.

Software Description:
– apport: automatically generate crash reports for debugging

Details:

USN-3480-2 fixed regressions in Apport. The update introduced a new
regression in the container support. This update addresses the problem.

We apologize for the inconvenience.

Original advisory details:

 Sander Bos discovered that Apport incorrectly handled core dumps for
 setuid binaries. A local attacker could use this issue to perform a
 denial of service via resource exhaustion or possibly gain root
 privileges. (CVE-2017-14177)

 Sander Bos discovered that Apport incorrectly handled core dumps for
 processes in a different PID namespace. A local attacker could use
 this issue to perform a denial of service via resource exhaustion or
 possibly gain root privileges. (CVE-2017-14180)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  apport                          2.20.7-0ubuntu3.7

Ubuntu 17.04:
  apport                          2.20.4-0ubuntu4.10

Ubuntu 16.04 LTS:
  apport                          2.20.1-0ubuntu2.15

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3480-3
  https://www.ubuntu.com/usn/usn-3480-1
  https://launchpad.net/bugs/1733366

Package Information:
  https://launchpad.net/ubuntu/+source/apport/2.20.7-0ubuntu3.7
  https://launchpad.net/ubuntu/+source/apport/2.20.4-0ubuntu4.10
  https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.15
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJaTUutAAoJEEW851uECx9pHlgQALruJzSOCmtRRhlxgdsUNSkd
HKpxngOGbD1O9SoJpUrzcZeXJKSRXOcD1eQlsjLF6QETcHzTd4mKTjGCRolJdtMJ
AZboswTFsoxfy/hOmZIujJdkbCmbwzb/NEweZ9jWwftzsOeSaAbtnW9M1dVQspcx
nqx+8Hs9nSs7u3fGCaHjc42v0klNbJXAnSXJlUxqeHaKs0avsUqf11LUPNjh48ai
CMCB/kj3TUCvTaQf3LuVelGxb4EkrWhb5r+1CFtOXDhotlmiA0rY84A3yIbAAhvS
ix5P2uM1bC0/kGUG8zXu8Bvo+vZDpCEFVxOAhpDAS/MBy0RXhrULDYikGUi+B50J
iqRNobEj/5NoYznanH0QeX6K5AGn75d5VShoRNnM7AykRMLMk6Qx0Ajk5Ax6Let6
F4bl56KkdVFRxmYAsiuDt+Is+Xloa3W68ltob/FclGb6i1B5UZQ2Dg1vSyAsYnpf
eFvurZN9V4Qlamw8yHIyLS84FIQjOclwWvGnSCkgZHwboxtIVSkQCSb6gOTCEWlQ
fAnyIdeS8IXJbSbHQ1opxvgAOgRLGwsT3IRnrEuqUzgNzNEm+PfzYM8QJJbwgefh
CMJR0iCT5c134yp6wee5yA5UlQdy6g6yytzQGznhT9MpA5CgoQcd3l/lkAMJ6AMw
zNWtC7vRFRYXQWqlzFrn
=QNim
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1_7_0-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-1_7_0-openjdk za operacijski sustav SUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem...

Close