Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in Apport (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in Apport (Aktualisierung)
ID: USN-3664-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS
Datum: Mo, 4. Juni 2018, 20:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6552
Applikationen: Apport
Update von: Ausführen von Code mit höheren Privilegien in Apport

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8939634362779505964==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="fT41pwsqT03GSAx8e7vmbAH0GZMsQSJP9"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--fT41pwsqT03GSAx8e7vmbAH0GZMsQSJP9
Content-Type: multipart/mixed;
boundary="QxdO4uF334hl9PqXgEuExf0359CgPX0HV";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <9bdffb8b-1df3-8053-dce4-c1e049aa8f14@canonical.com>
Subject: [USN-3664-2] Apport vulnerability

--QxdO4uF334hl9PqXgEuExf0359CgPX0HV
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3664-2
June 04, 2018

apport vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

Apport could be tricked into causing a denial of service or escalate
privileges.

Software Description:
- apport: automatically generate crash reports for debugging

Details:

USN-3664-1 fixed a vulnerability in Apport. Sander Bos reported that Ubuntu
14.04 LTS was also vulnerable to this issue, but was incorrectly omitted
from the previous updates. This update provides the corresponding update
for Ubuntu 14.04 LTS.

Original advisory details:

Sander Bos discovered that Apport incorrectly handled core dumps when
certain files are missing from /proc. A local attacker could possibly use
this issue to cause a denial of service, gain root privileges, or escape
from containers.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.29

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3664-2
https://usn.ubuntu.com/usn/usn-3664-1
CVE-2018-6552

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.29


--QxdO4uF334hl9PqXgEuExf0359CgPX0HV--

--fT41pwsqT03GSAx8e7vmbAH0GZMsQSJP9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlsVe8sACgkQZWnYVadE
vpMtLQ//cX4KN1fqUJCf2my/trO7ldXXTWqoBoJZWdUpREOgz/ugggnAeYQJEEQ0
HlaCJkOk6TU4MfwW7vkAsbErdQM6eLXEgN2MLIFZpjTvk9KA/PKqmzZ5wmmlX1Jm
0VeibY8xnHTphSq4hnScYA4GXoO7SkLfGcw4ug73gt+yfLfp0zS1jsJfH6WrPqYB
gkQS+AUzIptovstKkaFpmpLM+/x+wi1dZn+T2pBJ0baOWoqq3WuydjUP5kp9io/b
+bXqaySGKzG74pmk2iV3z72aOw1e49r/rR1QFoAHLREncANqCxRANW/dmV0BLOXP
tOIsg5TRZYiYFt8EJ4LU3qhTbQYMzWmBxPRHwcrhoGR9TxFNgtf06xpyeTIxrKUs
EtuxYxj/WC7hcsrwxl3p3AEP8+ggiA2Zf/CRuMsTevQoSPPaAJPXTvA8XBAluK1m
6W/qmYfgh2KsU5LiEOwMb20kUAhht56d6RmZMIUlw10kdv50z3kFW5DR4Ii+3d8c
o7luUB4kVKHkbei1f1OWaJ2r+nIECPL0ZREFprwm3K5FWqc80YNbaCDHlBpy9+J/
fpkvxmzesC6m5vnSyjVqSU7RBZlZHPpG7FYy+iKE+7ziTB9s56qqjQZxxwLhp4ot
6/t7JOosSXheXPFth9Tk5xHiDPfeYbuYIAInpZu6mm8fyAfGHCs=
=I8Rm
-----END PGP SIGNATURE-----

--fT41pwsqT03GSAx8e7vmbAH0GZMsQSJP9--


--===============8939634362779505964==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============8939634362779505964==--
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung