{"id":"USN-3664-2","summary":"apport vulnerability","details":"USN-3664-1 fixed a vulnerability in Apport. Sander Bos reported that Ubuntu\n14.04 LTS was also vulnerable to this issue, but was incorrectly omitted\nfrom the previous updates. This update provides the corresponding update\nfor Ubuntu 14.04 LTS.\n\nOriginal advisory details:\n\n Sander Bos discovered that Apport incorrectly handled core dumps when\n certain files are missing from /proc. A local attacker could possibly use\n this issue to cause a denial of service, gain root privileges, or escape\n from containers.\n","modified":"2026-02-10T04:41:21Z","published":"2018-06-04T16:39:21Z","related":["UBUNTU-CVE-2018-6552"],"upstream":["CVE-2018-6552","UBUNTU-CVE-2018-6552"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3664-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6552"}],"affected":[{"package":{"name":"apport","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/apport@2.14.1-0ubuntu3.29?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.1-0ubuntu3.29"}]}],"versions":["2.12.5-0ubuntu2","2.12.6-0ubuntu1","2.12.7-0ubuntu1","2.12.7-0ubuntu2","2.12.7-0ubuntu3","2.12.7-0ubuntu6","2.13.1-0ubuntu1","2.13.1-0ubuntu2","2.13.2-0ubuntu2","2.13.2-0ubuntu3","2.13.2-0ubuntu4","2.13.2-0ubuntu5","2.13.3-0ubuntu1","2.14-0ubuntu1","2.14.1-0ubuntu1","2.14.1-0ubuntu2","2.14.1-0ubuntu3","2.14.1-0ubuntu3.1","2.14.1-0ubuntu3.2","2.14.1-0ubuntu3.3","2.14.1-0ubuntu3.4","2.14.1-0ubuntu3.5","2.14.1-0ubuntu3.6","2.14.1-0ubuntu3.7","2.14.1-0ubuntu3.8","2.14.1-0ubuntu3.9","2.14.1-0ubuntu3.10","2.14.1-0ubuntu3.11","2.14.1-0ubuntu3.12","2.14.1-0ubuntu3.13","2.14.1-0ubuntu3.15","2.14.1-0ubuntu3.16","2.14.1-0ubuntu3.18","2.14.1-0ubuntu3.19","2.14.1-0ubuntu3.20","2.14.1-0ubuntu3.21","2.14.1-0ubuntu3.23","2.14.1-0ubuntu3.24","2.14.1-0ubuntu3.25","2.14.1-0ubuntu3.27","2.14.1-0ubuntu3.28"],"ecosystem_specific":{"binaries":[{"binary_name":"apport","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"apport-gtk","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"apport-kde","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"apport-noui","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"apport-retrace","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"apport-valgrind","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"dh-apport","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"python-apport","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"python-problem-report","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"python3-apport","binary_version":"2.14.1-0ubuntu3.29"},{"binary_name":"python3-problem-report","binary_version":"2.14.1-0ubuntu3.29"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2018-6552"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3664-2.json"}}],"schema_version":"1.7.3"}