製品・ソフトウェアに関する情報
Apport におけるリソース管理に関する脆弱性
Title Apport におけるリソース管理に関する脆弱性
Summary

Apport には、リソース管理に関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date May 30, 2018, midnight
Registration Date Aug. 13, 2018, 5:49 p.m.
Last Update Aug. 13, 2018, 5:49 p.m.
CVSS3.0 : 重要
Score 7.8
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS2.0 : 危険
Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Affected System
Apport project
Apport 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年08月13日]
  掲載
Aug. 13, 2018, 5:49 p.m.

NVD Vulnerability Information
CVE-2018-6552
Summary

Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/<global pid>/ does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc/<global pid>/ does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28.

Publication Date June 1, 2018, 7:29 a.m.
Registration Date March 1, 2021, 7:35 p.m.
Last Update Nov. 21, 2024, 1:10 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:apport_project:apport:2.20.9:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:apport_project:apport:2.20.7:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:apport_project:apport:2.20.1:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Related information, measures and tools
Common Vulnerabilities List