==========================================================================
Ubuntu Security Notice USN-3480-3
January 03, 2018
apport regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.10
– Ubuntu 17.04
– Ubuntu 16.04 LTS
Summary:
USN-3480-2 introduced regressions in Apport.
Software Description:
– apport: automatically generate crash reports for debugging
Details:
USN-3480-2 fixed regressions in Apport. The update introduced a new
regression in the container support. This update addresses the problem.
We apologize for the inconvenience.
Original advisory details:
Sander Bos discovered that Apport incorrectly handled core dumps for
setuid binaries. A local attacker could use this issue to perform a
denial of service via resource exhaustion or possibly gain root
privileges. (CVE-2017-14177)
Sander Bos discovered that Apport incorrectly handled core dumps for
processes in a different PID namespace. A local attacker could use
this issue to perform a denial of service via resource exhaustion or
possibly gain root privileges. (CVE-2017-14180)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
apport 2.20.7-0ubuntu3.7
Ubuntu 17.04:
apport 2.20.4-0ubuntu4.10
Ubuntu 16.04 LTS:
apport 2.20.1-0ubuntu2.15
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3480-3
https://www.ubuntu.com/usn/usn-3480-1
https://launchpad.net/bugs/1733366
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.7-0ubuntu3.7
https://launchpad.net/ubuntu/+source/apport/2.20.4-0ubuntu4.10
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.15
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAABCAAGBQJaTUutAAoJEEW851uECx9pHlgQALruJzSOCmtRRhlxgdsUNSkd
HKpxngOGbD1O9SoJpUrzcZeXJKSRXOcD1eQlsjLF6QETcHzTd4mKTjGCRolJdtMJ
AZboswTFsoxfy/hOmZIujJdkbCmbwzb/NEweZ9jWwftzsOeSaAbtnW9M1dVQspcx
nqx+8Hs9nSs7u3fGCaHjc42v0klNbJXAnSXJlUxqeHaKs0avsUqf11LUPNjh48ai
CMCB/kj3TUCvTaQf3LuVelGxb4EkrWhb5r+1CFtOXDhotlmiA0rY84A3yIbAAhvS
ix5P2uM1bC0/kGUG8zXu8Bvo+vZDpCEFVxOAhpDAS/MBy0RXhrULDYikGUi+B50J
iqRNobEj/5NoYznanH0QeX6K5AGn75d5VShoRNnM7AykRMLMk6Qx0Ajk5Ax6Let6
F4bl56KkdVFRxmYAsiuDt+Is+Xloa3W68ltob/FclGb6i1B5UZQ2Dg1vSyAsYnpf
eFvurZN9V4Qlamw8yHIyLS84FIQjOclwWvGnSCkgZHwboxtIVSkQCSb6gOTCEWlQ
fAnyIdeS8IXJbSbHQ1opxvgAOgRLGwsT3IRnrEuqUzgNzNEm+PfzYM8QJJbwgefh
CMJR0iCT5c134yp6wee5yA5UlQdy6g6yytzQGznhT9MpA5CgoQcd3l/lkAMJ6AMw
zNWtC7vRFRYXQWqlzFrn
=QNim
—–END PGP SIGNATURE—–
—