USN-4720-2: Apport vulnerabilities
3 February 2021
Several security issues were fixed in Apport.
Releases
Packages
- apport - automatically generate crash reports for debugging
Details
USN-4720-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Itai Greenhut discovered that Apport incorrectly parsed certain files in
the /proc filesystem. A local attacker could use this issue to escalate
privileges and run arbitrary code. (CVE-2021-25682, CVE-2021-25683)
Itai Greenhut discovered that Apport incorrectly handled opening certain
special files. A local attacker could possibly use this issue to cause
Apport to hang, resulting in a denial of service. (CVE-2021-25684)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
python-apport
-
2.14.1-0ubuntu3.29+esm6
-
python3-apport
-
2.14.1-0ubuntu3.29+esm6
-
apport
-
2.14.1-0ubuntu3.29+esm6
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4720-1: python-problem-report, apport-noui, python3-problem-report, apport-gtk, apport-retrace, apport-kde, apport, python-apport, python3-apport, dh-apport, apport-valgrind