apport vulnerabilities

Related Vulnerabilities: CVE-2015-1324   CVE-2015-1325  

Apport could be tricked into creating arbitrary files as an administrator, resulting in privilege escalation.

Sander Bos discovered that Apport incorrectly handled permissions when the system was configured to generate core dumps for setuid binaries. A local attacker could use this issue to gain elevated privileges. (CVE-2015-1324)

21 May 2015

apport vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Apport could be tricked into creating arbitrary files as an administrator, resulting in privilege escalation.

Software Description

  • apport - automatically generate crash reports for debugging

Details

Sander Bos discovered that Apport incorrectly handled permissions when the system was configured to generate core dumps for setuid binaries. A local attacker could use this issue to gain elevated privileges. (CVE-2015-1324)

Philip Pettersson discovered that Apport contained race conditions resulting core dumps to be generated with incorrect permissions in arbitrary locations. A local attacker could use this issue to gain elevated privileges. (CVE-2015-1325)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04
apport - 2.17.2-0ubuntu1.1
Ubuntu 14.10
apport - 2.14.7-0ubuntu8.5
Ubuntu 14.04 LTS
apport - 2.14.1-0ubuntu3.11
Ubuntu 12.04 LTS
apport - 2.0.1-0ubuntu17.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References