Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Apport
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Apport
ID: USN-5427-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 21.10, Ubuntu 22.04 LTS
Datum: Mi, 18. Mai 2022, 07:24
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1242
Applikationen: Apport

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4433220525336678104==
Content-Language: en-CA
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------WduLT88dDZQun0hgAFLFChE6"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------WduLT88dDZQun0hgAFLFChE6
Content-Type: multipart/mixed;
boundary="------------HQG2mZq5BQ3snolv6IVJFEv6";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <55d0fe66-0c71-8a4b-f8b2-558388239fd8@canonical.com>
Subject: [USN-5427-1] Apport vulnerabilities

--------------HQG2mZq5BQ3snolv6IVJFEv6
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-5427-1
May 17, 2022

apport vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Apport.

Software Description:
- apport: automatically generate crash reports for debugging

Details:

Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to denial of service. (CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
apport 2.20.11-0ubuntu82.1
python3-apport 2.20.11-0ubuntu82.1

Ubuntu 21.10:
apport 2.20.11-0ubuntu71.2
python3-apport 2.20.11-0ubuntu71.2

Ubuntu 20.04 LTS:
apport 2.20.11-0ubuntu27.24
python3-apport 2.20.11-0ubuntu27.24

Ubuntu 18.04 LTS:
apport 2.20.9-0ubuntu7.28
python3-apport 2.20.9-0ubuntu7.28

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5427-1
CVE-2021-3899, CVE-2022-1242, CVE-2022-28652, CVE-2022-28654,
CVE-2022-28655, CVE-2022-28656, CVE-2022-28657, CVE-2022-28658

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu82.1
https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu71.2
https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu27.24
https://launchpad.net/ubuntu/+source/apport/2.20.9-0ubuntu7.28

--------------HQG2mZq5BQ3snolv6IVJFEv6--

--------------WduLT88dDZQun0hgAFLFChE6
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=B+WF
-----END PGP SIGNATURE-----

--------------WduLT88dDZQun0hgAFLFChE6--


--===============4433220525336678104==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============4433220525336678104==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung