First published: Mon Nov 20 2017(Updated: )
USN-3480-1 fixed vulnerabilities in Apport. The fix for CVE-2017-14177 introduced a regression in the ability to handle crashes for users that configured their systems to use the Upstart init system in Ubuntu 16.04 LTS and Ubuntu 17.04. The fix for CVE-2017-14180 temporarily disabled crash forwarding to containers. This update addresses the problems. We apologize for the inconvenience. Original advisory details: Sander Bos discovered that Apport incorrectly handled core dumps for setuid binaries. A local attacker could use this issue to perform a denial of service via resource exhaustion or possibly gain root privileges. (CVE-2017-14177) Sander Bos discovered that Apport incorrectly handled core dumps for processes in a different PID namespace. A local attacker could use this issue to perform a denial of service via resource exhaustion or possibly gain root privileges. (CVE-2017-14180)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apport | <2.20.7-0ubuntu3.5 | 2.20.7-0ubuntu3.5 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/apport | <2.20.4-0ubuntu4.8 | 2.20.4-0ubuntu4.8 |
Ubuntu Ubuntu | =17.04 | |
All of | ||
ubuntu/apport | <2.20.1-0ubuntu2.13 | 2.20.1-0ubuntu2.13 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.