UbuntuUpdates.org

Package "apport"

Name: apport

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • KDE frontend for the apport crash report system
  • tools for automatically reporting Apport crash reports
  • valgrind wrapper that first downloads debug symbols
  • debhelper extension for the apport crash report system

Latest version: 2.20.11-0ubuntu50.7
Release: groovy (20.10)
Level: updates
Repository: universe

Links



Other versions of "apport" in Groovy

Repository Area Version
base universe 2.20.11-0ubuntu50
base main 2.20.11-0ubuntu50
security main 2.20.11-0ubuntu50.7
security universe 2.20.11-0ubuntu50.7
updates main 2.20.11-0ubuntu50.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.20.11-0ubuntu50.7 2021-05-25 18:06:37 UTC

  apport (2.20.11-0ubuntu50.7) groovy-security; urgency=medium

  * SECURITY UPDATE: Multiple arbitrary file reads (LP: #1917904)
    - apport/hookutils.py: don't follow symlinks and make sure the file
      isn't a FIFO in read_file().
    - test/test_hookutils.py: added symlink tests.
    - CVE-2021-32547, CVE-2021-32548, CVE-2021-32549, CVE-2021-32550,
      CVE-2021-32551, CVE-2021-32552, CVE-2021-32553, CVE-2021-32554,
      CVE-2021-32555
  * SECURITY UPDATE: info disclosure via modified config files spoofing
    (LP: #1917904)
    - backends/packaging-apt-dpkg.py: properly terminate arguments in
      get_modified_conffiles.
    - CVE-2021-32556
  * SECURITY UPDATE: arbitrary file write (LP: #1917904)
    - data/whoopsie-upload-all: don't follow symlinks and make sure the
      file isn't a FIFO in process_report().
    - CVE-2021-32557

 -- Marc Deslauriers <email address hidden> Tue, 18 May 2021 09:15:10 -0400

Source diff to previous version
CVE-2021-32547 RESERVED
CVE-2021-32548 RESERVED
CVE-2021-32549 RESERVED
CVE-2021-32550 RESERVED
CVE-2021-32551 RESERVED
CVE-2021-32552 RESERVED
CVE-2021-32553 RESERVED
CVE-2021-32554 RESERVED
CVE-2021-32555 RESERVED
CVE-2021-32556 RESERVED
CVE-2021-32557 RESERVED

Version: 2.20.11-0ubuntu50.6 2021-05-06 12:06:24 UTC

  apport (2.20.11-0ubuntu50.6) groovy; urgency=medium

  * data/general-hooks/ubuntu.py: tag bugs from Raspberry Pi images and RISCV
    images appropriately. (LP: #1920837)
  * apport/hookutils.py: spawn pkttyagent so that log files can be gathered as
    root in a non-graphical environment (LP: #1821415). Thanks to Iain Lane
    for the patch.
  * apport/hookutils.py: root access is needed to read the
    casper-md5check.json file so switch to using that. (LP: #1922937)

 -- Brian Murray <email address hidden> Mon, 26 Apr 2021 12:45:36 -0700

Source diff to previous version
1920837 apport bugs from official raspi or riscv images are not identified
1821415 pkexec fails in a non-graphical environment
1922937 reading casper-md5check.json fails

Version: 2.20.11-0ubuntu50.5 2021-02-02 20:07:56 UTC

  apport (2.20.11-0ubuntu50.5) groovy-security; urgency=medium

  * SECURITY UPDATE: multiple security issues (LP: #1912326)
    - CVE-2021-25682: error parsing /proc/pid/status
    - CVE-2021-25683: error parsing /proc/pid/stat
    - CVE-2021-25684: stuck reading fifo
    - data/apport: make sure existing report is a regular file.
    - apport/fileutils.py: move some logic here to skip over manipulated
      process names and filenames.
    - test/test_fileutils.py: added some parsing tests.

 -- Marc Deslauriers <email address hidden> Tue, 26 Jan 2021 07:21:46 -0500

Source diff to previous version
CVE-2021-25682 RESERVED
CVE-2021-25683 RESERVED
CVE-2021-25684 RESERVED

Version: 2.20.11-0ubuntu50.3 2020-12-14 20:06:20 UTC

  apport (2.20.11-0ubuntu50.3) groovy; urgency=medium

  * data/apport: only drop supplemental groups if we are root. (LP: #1906565)

 -- Brian Murray <email address hidden> Wed, 02 Dec 2020 12:51:33 -0800

Source diff to previous version
1906565 traceback when running apport as non-root user

Version: 2.20.11-0ubuntu50.2 2020-11-25 01:11:34 UTC

  apport (2.20.11-0ubuntu50.2) groovy; urgency=medium

  * data/apport: Modify the check for whether or not a process is running in
    the same namespace so that crashes from processes running protected in the
    system.slice are considered as being from the same namespace. (LP: #1870060)

 -- Brian Murray <email address hidden> Mon, 16 Nov 2020 14:33:58 -0800

1870060 systemd ProtectSystem/mount namespace makes apport fail (impact most of our default system services)



About   -   Send Feedback to @ubuntu_updates