drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Apport
Name: |
Mehrere Probleme in Apport |
|
ID: |
USN-5427-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 21.10, Ubuntu 22.04 LTS |
|
Datum: |
Mi, 18. Mai 2022, 07:24 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1242 |
|
Applikationen: |
Apport |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4433220525336678104== Content-Language: en-CA Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------WduLT88dDZQun0hgAFLFChE6"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------WduLT88dDZQun0hgAFLFChE6 Content-Type: multipart/mixed; boundary="------------HQG2mZq5BQ3snolv6IVJFEv6"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <55d0fe66-0c71-8a4b-f8b2-558388239fd8@canonical.com> Subject: [USN-5427-1] Apport vulnerabilities
--------------HQG2mZq5BQ3snolv6IVJFEv6 Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-5427-1 May 17, 2022
apport vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Apport.
Software Description: - apport: automatically generate crash reports for debugging
Details:
Muqing Liu and neoni discovered that Apport incorrectly handled detecting if an executable was replaced after a crash. A local attacker could possibly use this issue to execute arbitrary code as the root user. (CVE-2021-3899)
Gerrit Venema discovered that Apport incorrectly handled connections to Apport sockets inside containers. A local attacker could possibly use this issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)
Gerrit Venema discovered that Apport incorrectly handled user settings files. A local attacker could possibly use this issue to cause Apport to consume resources, leading to a denial of service. (CVE-2022-28652)
Gerrit Venema discovered that Apport did not limit the amount of logging from D-Bus connections. A local attacker could possibly use this issue to fill up the Apport log file, leading to denial of service. (CVE-2022-28654)
Gerrit Venema discovered that Apport did not filter D-Bus connection strings. A local attacker could possibly use this issue to cause Apport to make arbitrary network connections. (CVE-2022-28655)
Gerrit Venema discovered that Apport did not limit the amount of memory being consumed during D-Bus connections. A local attacker could possibly use this issue to cause Apport to consume memory, leading to a denial of service. (CVE-2022-28656)
Gerrit Venema discovered that Apport did not disable the python crash handler before chrooting into a container. A local attacker could possibly use this issue to execute arbitrary code. (CVE-2022-28657)
Gerrit Venema discovered that Apport incorrectly handled filename argument whitespace. A local attacker could possibly use this issue to spoof arguments to the Apport daemon. (CVE-2022-28658)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: apport 2.20.11-0ubuntu82.1 python3-apport 2.20.11-0ubuntu82.1
Ubuntu 21.10: apport 2.20.11-0ubuntu71.2 python3-apport 2.20.11-0ubuntu71.2
Ubuntu 20.04 LTS: apport 2.20.11-0ubuntu27.24 python3-apport 2.20.11-0ubuntu27.24
Ubuntu 18.04 LTS: apport 2.20.9-0ubuntu7.28 python3-apport 2.20.9-0ubuntu7.28
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5427-1 CVE-2021-3899, CVE-2022-1242, CVE-2022-28652, CVE-2022-28654, CVE-2022-28655, CVE-2022-28656, CVE-2022-28657, CVE-2022-28658
Package Information: https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu82.1 https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu71.2 https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu27.24 https://launchpad.net/ubuntu/+source/apport/2.20.9-0ubuntu7.28
--------------HQG2mZq5BQ3snolv6IVJFEv6--
--------------WduLT88dDZQun0hgAFLFChE6 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmKD2S4ACgkQZWnYVadE vpNcLhAAl4cYlpXyQ0o4BeEf2Ffbo1jecu67xsox/wijCvBcoHmLkYENaJb6499b fkG87JrrVcaiK9BvH7T+KvEplp2FaDLgf06YW8o/Mr+njm9DlmFmNZKwX2L+FduH 1ceWRgBX9p9C7r/eltf+BbOdwYtGdRro+Wy/Da7OZmFKh2zNIYSfchyy7NXm9pK3 Tvx6iAAt5RwHXC6h8+i9qbPFZQMZD0Q/hhkPA7WlCmYL1eAFf+EcfAWcg4IsvNje ZnqOD7/CVlq5ewSSCxzFu7gR5Pu6L0Cpi/7KlSwzY0cVFKEJRX4Wb6WTZcYiS0Gx 2hGEzc/WrHfo2ASl8qMnyjIpNs4VSiTj0Nas4cFUkJbdS0qHIMob9KeyPUoxZ/71 0wjim1a3P7Xf8RFO/WpioG+EEyVwx0rg+Aa2l6vdDAWDDSh24r45+AFNRl4RsRvg ppqWFJKsrsavbH2U6lJ3dXebQ/x4xWMXlJfNbvR+lJ33ubrtXkgxehsPZEIkaDin OGrhM01tdYGK7K/jPZ/SaQdwrNgDsnEWStfG6ZhrcYjfg7B5w07QY/AhEkUkvjEi 3S4eScain/stly8v9Re/Tu/+6tMYJ7BtB0RjLrE4UzttPABiK5G+uksgQSZEb/qI 35Tj3ocs6zx9hgo/2+stKXAigei9o8HCd5Xko9XlFKDG9Wgb2Zw= =B+WF -----END PGP SIGNATURE-----
--------------WduLT88dDZQun0hgAFLFChE6--
--===============4433220525336678104== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============4433220525336678104==--
|
|
|
|