Package "apport"

Name: apport


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • KDE frontend for the apport crash report system
  • tools for automatically reporting Apport crash reports
  • valgrind wrapper that first downloads debug symbols
  • debhelper extension for the apport crash report system

Latest version: 2.20.1-0ubuntu2.23
Release: xenial (16.04)
Level: updates
Repository: universe


Save this URL for the latest version of "apport": https://www.ubuntuupdates.org/apport

Other versions of "apport" in Xenial

Repository Area Version
base universe 2.20.1-0ubuntu2
base main 2.20.1-0ubuntu2
security universe 2.20.1-0ubuntu2.23
security main 2.20.1-0ubuntu2.23
updates main 2.20.1-0ubuntu2.23

Packages in group

Deleted packages are displayed in grey.


Version: 2.20.1-0ubuntu2.23 2020-04-02 05:06:30 UTC

  apport (2.20.1-0ubuntu2.23) xenial-security; urgency=medium

  * SECURITY UPDATE: World writable root owned lock file created in user
    controllable location (LP: #1862348)
    - data/apport: Change location of lock file to be directly under
      /var/run so that regular users can not directly access it or perform
      symlink attacks.
    - CVE-2020-8831
  * SECURITY UPDATE: Race condition between report creation and ownership
    (LP: #1862933)
    - data/apport: When setting owner of report file use a file-descriptor
      to the report file instead of its path name to ensure that users can
      not cause Apport to change the ownership of other files via a
      symlink attack.
    - CVE-2020-8833

 -- Alex Murray <email address hidden> Wed, 25 Mar 2020 11:50:41 +1030

Source diff to previous version
1862348 Apport lock file root privilege escalation
1862933 Apport crash report \u0026 cron script TOCTTOU
CVE-2020-8831 RESERVED
CVE-2020-8833 RESERVED

Version: 2.20.1-0ubuntu2.22 2020-03-18 03:06:27 UTC

  apport (2.20.1-0ubuntu2.22) xenial-security; urgency=medium

  [ Michael Hudson-Doyle ]
  * SECURITY REGRESSION: fix autopkgtest failures since recent security
    update (LP: #1854237)
    - Fix regression in creating report for crashing setuid process by getting
      kernel to tell us the executable path rather than reading
    - Fix deletion of partially written core files.
    - Fix test_get_logind_session to use new API.
    - Restore add_proc_info raising ValueError for a dead process.
    - Delete test_lock_symlink, no longer applicable now that the lock is
      created in a directory only root can write to.

  [ Tiago Stürmer Daitx ]
  * SECURITY REGRESSION: 'module' object has no attribute 'O_PATH'
    (LP: #1851806)
    - apport/report.py, apport/ui.py: use file descriptors for /proc/pid
      directory access only when running under python 3; prevent reading /proc
      maps under python 2 as it does not provide a secure way to do so; use
      io.open for better compatibility between python 2 and 3.
  * data/apport: fix number of arguments passed through socks into a container.
  * test/test_report.py: test login session with both pid and proc_pid_fd.
  * test/test_apport_valgrind.py: skip test_sandbox_cache_options if system
    has little memory.
  * test/test_ui.py: modify run_crash_kernel test to account for the fact that
    linux-image-$kvers-$flavor is now built from the linux-signed source
    package on amd64 and ppc64el. (LP: #1766740)

 -- Tiago Stürmer Daitx <email address hidden> Thu, 27 Feb 2020 03:18:45 +0000

Source diff to previous version
1854237 autopkgtests fail after security fixes
1851806 'module' object has no attribute 'O_PATH'
1766740 apport autopkgtest regression due to kernel packaging changes

Version: 2.20.1-0ubuntu2.21 2019-11-05 07:07:13 UTC

  apport (2.20.1-0ubuntu2.21) xenial-security; urgency=medium

  * SECURITY REGRESSION: missing argument in Report.add_proc_environ
    call (LP: #1850929)
    - apport/report.py: call add_proc_environ using named arguments
      and move proc_pid_dir keyword to last to keep api compatibility.

 -- Tiago Stürmer Daitx <email address hidden> Tue, 05 Nov 2019 02:49:27 +0000

Source diff to previous version
1850929 python3-apport regression: missing argument in Report.add_proc_environ call

Version: 2.20.1-0ubuntu2.20 2019-10-30 08:06:42 UTC

  apport (2.20.1-0ubuntu2.20) xenial-security; urgency=medium

  * SECURITY UPDATE: apport reads arbitrary files if ~/.config/apport/settings
    is a symlink (LP: #1830862)
    - apport/fileutils.py: drop permissions before reading user settings file.
    - CVE-2019-11481
  * SECURITY UPDATE: TOCTTOU race conditions and following symbolic
    links when creating a core file (LP: #1839413)
    - data/apport: use file descriptor to reference to cwd instead
      of strings.
    - CVE-2019-11482
  * SECURITY UPDATE: fully user controllable lock file due to lock file
    being located in world-writable directory (LP: #1839415)
    - data/apport: create and use lock file from /var/lock/apport.
    - CVE-2019-11485
  * SECURITY UPDATE: per-process user controllable Apport socket file
    (LP: #1839420)
    - data/apport: forward crashes only under a valid uid and gid,
      thanks Stéphane Graber for the patch.
    - CVE-2019-11483
  * SECURITY UPDATE: PID recycling enables an unprivileged user to
    generate and read a crash report for a privileged process (LP: #1839795)
    - data/apport: drop permissions before adding proc info (special thanks
      to Kevin Backhouse for the patch)
    - data/apport, apport/report.py, apport/ui.py: only access or open
      /proc/[pid] through a file descriptor for that directory.
    - CVE-2019-15790

 -- Tiago Stürmer Daitx <email address hidden> Tue, 29 Oct 2019 05:23:08 +0000

Source diff to previous version
1830862 Apport reads arbitrary files if ~/.config/apport/settings is a symlink
1839413 TOCTTOU (\
1839415 Fully user controllable lock file due to lock file being located in world-writable directory
1839420 Per-process user controllable Apport socket file
1839795 PID recycling enables an unprivileged user to generate and read a crash report for a privileged process
CVE-2019-11481 RESERVED
CVE-2019-11482 RESERVED
CVE-2019-11485 RESERVED
CVE-2019-11483 RESERVED
CVE-2019-15790 RESERVED

Version: 2.20.1-0ubuntu2.19 2019-07-09 01:08:10 UTC

  apport (2.20.1-0ubuntu2.19) xenial-security; urgency=medium

  * SECURITY UPDATE: TOCTOU issue allows local user to read arbitrary
    files (LP: #1830858)
    - apport/report.py: Avoid TOCTOU issue on users ignore file by
      dropping privileges and then opening the file both test for access and
      open the file in a single operation, instead of using access() before
      reading the file which could be abused by a symlink to cause Apport to
      read and embed an arbitrary file in the resulting crash dump.
    - CVE-2019-7307

 -- Alex Murray <email address hidden> Thu, 04 Jul 2019 12:05:21 +0930

1830858 TOCTOU vulnerability in _get_ignore_dom (report.py)
CVE-2019-7307 RESERVED

About   -   Send Feedback to @ubuntu_updates