==========================================================================
Ubuntu Security Notice USN-6894-1
July 11, 2024

apport vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Apport.

Software Description:
- apport: automatically generate crash reports for debugging

Details:

Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to a denial of service.
(CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
   apport                          2.20.1-0ubuntu2.30+esm4
                                   Available with Ubuntu Pro
   python-apport                   2.20.1-0ubuntu2.30+esm4
                                   Available with Ubuntu Pro
   python3-apport                  2.20.1-0ubuntu2.30+esm4
                                   Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6894-1
   https://ubuntu.com/security/notices/USN-5427-1
   CVE-2021-3899, CVE-2022-1242, CVE-2022-28652, CVE-2022-28654,
   CVE-2022-28655, CVE-2022-28656, CVE-2022-28657, CVE-2022-28658

Critical Security Advisory for Apport Vulnerabilities in Ubuntu 16.04

July 11, 2024
Several security issues were fixed in Apport.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Apport. Software Description: - apport: automatically generate crash reports for debugging Details: Muqing Liu and neoni discovered that Apport incorrectly handled detecting if an executable was replaced after a crash. A local attacker could possibly use this issue to execute arbitrary code as the root user. (CVE-2021-3899) Gerrit Venema discovered that Apport incorrectly handled connections to Apport sockets inside containers. A local attacker could possibly use this issue to connect to arbitrary sockets as the root user. (CVE-2022-1242) Gerrit Venema discovered that Apport incorrectly handled user settings files. A local attacker could possibly use this issue to cause Apport to consume resources, leading to a denial of service. (CVE-2022-28652) Gerrit Venema discovered that Apport did not limit the amount of l...

Read the Full Advisory

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS   apport                          2.20.1-0ubuntu2.30+esm4                                   Available with Ubuntu Pro   python-apport                   2.20.1-0ubuntu2.30+esm4                                   Available with Ubuntu Pro   python3-apport                  2.20.1-0ubuntu2.30+esm4                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes.

References

  https://ubuntu.com/security/notices/USN-6894-1

  https://ubuntu.com/security/notices/USN-5427-1

  CVE-2021-3899, CVE-2022-1242, CVE-2022-28652, CVE-2022-28654,

  CVE-2022-28655, CVE-2022-28656, CVE-2022-28657, CVE-2022-28658

Severity
Ubuntu Security Notice USN-6894-1

Package Information

Related News