USN-6894-1

Source
https://ubuntu.com/security/notices/USN-6894-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6894-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6894-1
Related
Published
2024-07-11T20:08:16.986975Z
Modified
2024-07-11T20:08:16.986975Z
Summary
apport vulnerabilities
Details

Muqing Liu and neoni discovered that Apport incorrectly handled detecting if an executable was replaced after a crash. A local attacker could possibly use this issue to execute arbitrary code as the root user. (CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to Apport sockets inside containers. A local attacker could possibly use this issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings files. A local attacker could possibly use this issue to cause Apport to consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging from D-Bus connections. A local attacker could possibly use this issue to fill up the Apport log file, leading to a denial of service. (CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection strings. A local attacker could possibly use this issue to cause Apport to make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory being consumed during D-Bus connections. A local attacker could possibly use this issue to cause Apport to consume memory, leading to a denial of service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash handler before chrooting into a container. A local attacker could possibly use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument whitespace. A local attacker could possibly use this issue to spoof arguments to the Apport daemon. (CVE-2022-28658)

References

Affected packages

Ubuntu:Pro:16.04:LTS / apport

Package

Name
apport
Purl
pkg:deb/ubuntu/apport?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.1-0ubuntu2.30+esm4

Affected versions

2.*

2.19.1-0ubuntu3
2.19.2-0ubuntu1
2.19.2-0ubuntu2
2.19.2-0ubuntu3
2.19.2-0ubuntu4
2.19.2-0ubuntu5
2.19.2-0ubuntu6
2.19.2-0ubuntu8
2.19.2-0ubuntu9
2.19.3-0ubuntu1
2.19.3-0ubuntu2
2.19.3-0ubuntu3
2.19.4-0ubuntu1
2.19.4-0ubuntu2
2.20-0ubuntu2
2.20-0ubuntu3
2.20.1-0ubuntu1
2.20.1-0ubuntu2
2.20.1-0ubuntu2.1
2.20.1-0ubuntu2.2
2.20.1-0ubuntu2.4
2.20.1-0ubuntu2.5
2.20.1-0ubuntu2.6
2.20.1-0ubuntu2.9
2.20.1-0ubuntu2.10
2.20.1-0ubuntu2.12
2.20.1-0ubuntu2.13
2.20.1-0ubuntu2.14
2.20.1-0ubuntu2.15
2.20.1-0ubuntu2.16
2.20.1-0ubuntu2.17
2.20.1-0ubuntu2.18
2.20.1-0ubuntu2.19
2.20.1-0ubuntu2.20
2.20.1-0ubuntu2.21
2.20.1-0ubuntu2.22
2.20.1-0ubuntu2.23
2.20.1-0ubuntu2.24
2.20.1-0ubuntu2.25
2.20.1-0ubuntu2.26
2.20.1-0ubuntu2.27
2.20.1-0ubuntu2.28
2.20.1-0ubuntu2.30
2.20.1-0ubuntu2.30+esm1
2.20.1-0ubuntu2.30+esm2
2.20.1-0ubuntu2.30+esm3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport-gtk"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport-kde"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport-noui"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport-retrace"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "apport-valgrind"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "dh-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "python-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "python-problem-report"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "python3-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.30+esm4",
            "binary_name": "python3-problem-report"
        }
    ]
}