=========================================================================Ubuntu Security Notice USN-2609-1
May 21, 2015

apport vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Apport could be tricked into creating arbitrary files as an administrator,
resulting in privilege escalation.

Software Description:
- apport: automatically generate crash reports for debugging

Details:

Sander Bos discovered that Apport incorrectly handled permissions when
the system was configured to generate core dumps for setuid binaries. A
local attacker could use this issue to gain elevated privileges.
(CVE-2015-1324)

Philip Pettersson discovered that Apport contained race conditions
resulting core dumps to be generated with incorrect permissions in
arbitrary locations. A local attacker could use this issue to gain elevated
privileges. (CVE-2015-1325)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
  apport                          2.17.2-0ubuntu1.1

Ubuntu 14.10:
  apport                          2.14.7-0ubuntu8.5

Ubuntu 14.04 LTS:
  apport                          2.14.1-0ubuntu3.11

Ubuntu 12.04 LTS:
  apport                          2.0.1-0ubuntu17.9

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-2609-1
  CVE-2015-1324, CVE-2015-1325

Package Information:
  https://launchpad.net/ubuntu/+source/apport/2.17.2-0ubuntu1.1
  https://launchpad.net/ubuntu/+source/apport/2.14.7-0ubuntu8.5
  https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.11
  https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.9


Ubuntu 2609-1: Apport vulnerabilities

May 21, 2015
Apport could be tricked into creating arbitrary files as an administrator, resulting in privilege escalation.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: apport 2.17.2-0ubuntu1.1 Ubuntu 14.10: apport 2.14.7-0ubuntu8.5 Ubuntu 14.04 LTS: apport 2.14.1-0ubuntu3.11 Ubuntu 12.04 LTS: apport 2.0.1-0ubuntu17.9 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-2609-1

CVE-2015-1324, CVE-2015-1325

Severity
May 21, 2015

Package Information

https://launchpad.net/ubuntu/+source/apport/2.17.2-0ubuntu1.1 https://launchpad.net/ubuntu/+source/apport/2.14.7-0ubuntu8.5 https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.11 https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.9

Related News