USN-4449-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Ryota Shiga working with Trend MicroΒ΄s Zero Day Initiative, discovered that
Apport incorrectly dropped privileges when making certain D-Bus calls. A
local attacker could use this issue to read arbitrary files.
(CVE-2020-11936)
Seong-Joong Kim discovered that Apport incorrectly parsed configuration
files. A local attacker could use this issue to cause Apport to crash,
resulting in a denial of service. (CVE-2020-15701)
Ryota Shiga working with Trend MicroΒ΄s Zero Day Initiative, discovered that
Apport incorrectly implemented certain checks. A local attacker could use
this issue to escalate privileges and run arbitrary code. (CVE-2020-15702)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | python-apport | <Β 2.14.1-0ubuntu3.29+esm5 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport-gtk | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport-kde | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport-noui | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport-retrace | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | apport-valgrind | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | dh-apport | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | python-apport | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | python-problem-report | <Β 2.14.1-0ubuntu3.29 | UNKNOWN |