[ubuntu/precise-security] apport 2.0.1-0ubuntu17.9 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu May 21 17:00:24 UTC 2015


apport (2.0.1-0ubuntu17.9) precise-security; urgency=medium

  * SECURITY UPDATE: When /proc/sys/fs/suid_dumpable is enabled, crashing a
    program that is suid root or not readable for the user would create
    root-owned core files in the current directory of that program.  Creating
    specially crafted core files in /etc/logrotate.d or similar could then
    lead to arbitrary code execution with root privileges.  Now core files do
    not get written for these kinds of programs, in accordance with the
    intention of core(5).
    Thanks to Sander Bos for discovering this issue!
    (CVE-2015-1324, LP: #1452239)
  * Add test case to ensure that users cannot inject arbitrary core dump file
    contents (CVE-2015-1325). This version is not affected, but having the
    test will ensure that backported changes don't introduce this
    vulnerability. (LP: #1453900)
  * test_signal_crashes(): Drop hardcoded /tmp/ path in do_crash(),
    test_nonwritable_cwd() uses a different dir.

apport (2.0.1-0ubuntu17.8) precise-proposed; urgency=medium

  [ Martin Pitt ]
  * report.py, add_gdb_info(): Check for truncated core dumps, and set
    UnreportableReason and raise an IOError on them. Handle this in
    apport-retrace and whoopsie-upload-all to fail properly instead of
    silently producing broken Stacktraces. (LP: #1354571)

apport (2.0.1-0ubuntu17.7) precise; urgency=low

  * fix up apport reporting for linux-lts-raring kernels (LP: #1352829)
    - add links for linux-lts-trusty to the package to map those to
      the source_linux.py hooks.

Date: 2015-05-15 17:43:12.745132+00:00
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.9
-------------- next part --------------
Sorry, changesfile not available.


More information about the Precise-changes mailing list