USN-3664-1 fixed a vulnerability in Apport. Sander Bos reported that Ubuntu 14.04 LTS was also vulnerable to this issue, but was incorrectly omitted from the previous updates. This update provides the corresponding update for Ubuntu 14.04 LTS.
Original advisory details:
Sander Bos discovered that Apport incorrectly handled core dumps when certain files are missing from /proc. A local attacker could possibly use this issue to cause a denial of service, gain root privileges, or escape from containers.
{
"binaries": [
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport-gtk"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport-kde"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport-noui"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport-retrace"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "apport-valgrind"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "dh-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "python-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "python-problem-report"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "python3-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.29",
"binary_name": "python3-problem-report"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2018-6552",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
]
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3664-2.json"