Package "apport-kde"
  
    
    
        | Name: | apport-kde | 
    
        | Description:
 | KDE frontend for the apport crash report system | 
    
        | Latest version: | 2.20.9-0ubuntu7.29+esm3 | 
    
        | Release: | bionic (18.04) | 
    
        | Level: | updates | 
    
        | Repository: | universe | 
         
            | Head package: | apport | 
        
            | Homepage: | https://wiki.ubuntu.com/Apport | 
    
   
  
  
 
Links
    Download "apport-kde"
    
Other versions of "apport-kde" in Bionic
    
Changelog
    
    
    
        
        
    
    
        |   apport (2.20.9-0ubuntu7.29+esm3) bionic-security; urgency=medium   * SECURITY REGRESSION: exception during core dump handling (LP: #2112466)
- data/apport: Catch FileNotFoundError when trying to open /proc/<pid>.
 - test/run: Use pyflakes3 instead of pyflakes for python3 files.
  -- Octavio Galland <email address hidden>  Tue, 08 Jul 2025 13:54:54 -0300 | 
    | Source diff to previous version | 
        
        | 
                
                | 2112466 | /usr/share/apport/apport:FileNotFoundError:/usr/share/apport/apport@600:get_pid_info on /proc/\u003cpid\u003e |  | 
    
    
    
    
    
        
        
    
    
        |   apport (2.20.9-0ubuntu7.29) bionic-security; urgency=medium   * SECURITY UPDATE: viewing an apport-cli crash with default pager could
escalate privilege (LP: #2016023)
 - apport/ui.py, apport/user_group.py, bin/apport-cli: drops privilege to
 users environment before execution (using sudo)
 - test/test_ui.py, test/test_user/group.py: Add test cases for new code
 - CVE-2023-1326
 * backends/packaging-apt-dpkg.py: when downloading packages from Launchpad
 do not require them to be authenticated. (LP: #1989467)
  -- Benjamin Drung <email address hidden>  Wed, 12 Apr 2023 19:53:49 +0200 | 
    | Source diff to previous version | 
        
        |  | 
    
    
    
    
    
        
        
    
    
        |   apport (2.20.9-0ubuntu7.28) bionic-security; urgency=medium   * SECURITY UPDATE: Fix multiple security issues
- test/test_report.py: Fix flaky test.
 - data/apport: Fix too many arguments for error_log().
 - data/apport: Use proper argument variable name executable_path.
 - etc/init.d/apport: Set core_pipe_limit to a non-zero value to make
 sure the kernel waits for apport to finish before removing the /proc
 information.
 - apport/fileutils.py, data/apport: Search for executable name if one
 wan't provided such as when being called in a container.
 - data/apport: Limit memory and duration of gdbus call. (CVE-2022-28654,
 CVE-2022-28656)
 - data/apport, apport/fileutils.py, test/test_fileutils.py: Validate
 D-Bus socket location. (CVE-2022-28655)
 - apport/fileutils.py, test/test_fileutils.py: Turn off interpolation
 in get_config() to prevent DoS attacks. (CVE-2022-28652)
 - Refactor duplicate code into search_map() function.
 - Switch from chroot to container to validating socket owner.
 (CVE-2022-1242, CVE-2022-28657)
 - data/apport: Clarify error message.
 - apport/fileutils.py: Fix typo in comment.
 - apport/fileutils.py: Do not call str in loop.
 - data/apport, etc/init.d/apport: Switch to using non-positional
 arguments. Get real UID and GID from the kernel and make sure they
 match the process. Also fix executable name space handling in
 argument parsing. (CVE-2022-28658, CVE-2021-3899)
 - debian/apport.init: restore symbolic link to proper directory.
  -- Marc Deslauriers <email address hidden>  Tue, 10 May 2022 09:23:35 -0400 | 
    | Source diff to previous version | 
        
        |  | 
    
    
    
    
    
        
        
    
    
        |   apport (2.20.9-0ubuntu7.27) bionic-security; urgency=medium   * SECURITY UPDATE: Privilege escalation via core files
- refactor privilege dropping and create core files in a well-known
 directory in apport/fileutils.py, apport/report.py, data/apport,
 test/test_fileutils.py, test/test_report.py,
 test/test_signal_crashes.py, test/test_ui.py.
 - use systemd-tmpfiles to create and manage the well-known core file
 directory in setup.py, data/systemd/apport.conf,
 debian/apport.install.
  -- Marc Deslauriers <email address hidden>  Mon, 18 Oct 2021 07:48:31 -0400 | 
    | Source diff to previous version | 
    
    
    
    
    
        
        
    
    
        |   apport (2.20.9-0ubuntu7.26) bionic-security; urgency=medium   * SECURITY UPDATE: Arbitrary file read (LP: #1934308)
- data/general-hooks/ubuntu.py: don't attempt to include emacs
 byte-compilation logs, they haven't been generated by the emacs
 packages in a long time.
 - CVE-2021-3709
 * SECURITY UPDATE: Info disclosure via path traversal (LP: #1933832)
 - apport/hookutils.py, test/test_hookutils.py: detect path traversal
 attacks, and directory symlinks.
 - CVE-2021-3710
  -- Marc Deslauriers <email address hidden>  Thu, 26 Aug 2021 10:56:33 -0400 | 
    
        
        |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates