USN-3664-1: Apport vulnerability

Publication date

30 May 2018

Overview

Apport could be tricked into causing a denial of service or escalate privileges.


Packages

  • apport - automatically generate crash reports for debugging

Details

Sander Bos discovered that Apport incorrectly handled core dumps when
certain files are missing from /proc. A local attacker could possibly use
this issue to cause a denial of service, gain root privileges, or escape
from containers.

Sander Bos discovered that Apport incorrectly handled core dumps when
certain files are missing from /proc. A local attacker could possibly use
this issue to cause a denial of service, gain root privileges, or escape
from containers.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
18.04 bionic apport –  2.20.9-0ubuntu7.1
17.10 artful apport –  2.20.7-0ubuntu3.9
16.04 xenial apport –  2.20.1-0ubuntu2.18

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›