-
apport (2.20.11-0ubuntu71.2) impish-security; urgency=medium
* SECURITY UPDATE: Fix multiple security issues
- test/test_report.py: Fix flaky test.
- data/apport: Fix too many arguments for error_log().
- data/apport: Use proper argument variable name executable_path.
- etc/init.d/apport: Set core_pipe_limit to a non-zero value to make
sure the kernel waits for apport to finish before removing the /proc
information.
- apport/fileutils.py, data/apport: Search for executable name if one
wan't provided such as when being called in a container.
- data/apport: Limit memory and duration of gdbus call. (CVE-2022-28654,
CVE-2022-28656)
- data/apport, apport/fileutils.py, test/test_fileutils.py: Validate
D-Bus socket location. (CVE-2022-28655)
- apport/fileutils.py, test/test_fileutils.py: Turn off interpolation
in get_config() to prevent DoS attacks. (CVE-2022-28652)
- Refactor duplicate code into search_map() function.
- Switch from chroot to container to validating socket owner.
(CVE-2022-1242, CVE-2022-28657)
- data/apport: Clarify error message.
- apport/fileutils.py: Fix typo in comment.
- apport/fileutils.py: Do not call str in loop.
- data/apport, etc/init.d/apport: Switch to using non-positional
arguments. Get real UID and GID from the kernel and make sure they
match the process. Also fix executable name space handling in
argument parsing. (CVE-2022-28658, CVE-2021-3899)
-- Marc Deslauriers <email address hidden> Tue, 10 May 2022 09:23:35 -0400
-
apport (2.20.11-0ubuntu71.1) impish; urgency=medium
* apport/ui.py: Error out when -w option is used on wayland (LP: #1952947).
-- Nick Rosbrook <email address hidden> Wed, 16 Feb 2022 12:16:27 -0500
-
apport (2.20.11-0ubuntu71) impish-security; urgency=medium
* SECURITY UPDATE: Privilege escalation via core files
- refactor privilege dropping and create core files in a well-known
directory in apport/fileutils.py, apport/report.py, data/apport,
test/test_fileutils.py, test/test_report.py,
test/test_signal_crashes.py, test/test_ui.py.
- use systemd-tmpfiles to create and manage the well-known core file
directory in setup.py, data/systemd/apport.conf,
debian/apport.install.
-- Marc Deslauriers <email address hidden> Mon, 18 Oct 2021 07:48:31 -0400
-
apport (2.20.11-0ubuntu70) impish; urgency=medium
* etc/apport/crashdb.conf: Disable Launchpad crash reports for 21.10
release.
* debian/tests/upstream-system: Set /proc/sys/kernel/core_uses_pid to 0 as
that's the easiest way to fix tests that expect the core file to be named
core and not core.PID
-- Brian Murray <email address hidden> Mon, 04 Oct 2021 13:14:35 -0700
-
apport (2.20.11-0ubuntu69) impish; urgency=medium
* SECURITY UPDATE: Arbitrary file read (LP: #1934308)
- data/general-hooks/ubuntu.py: don't attempt to include emacs
byte-compilation logs, they haven't been generated by the emacs
packages in a long time.
- CVE-2021-3709
* SECURITY UPDATE: Info disclosure via path traversal (LP: #1933832)
- apport/hookutils.py, test/test_hookutils.py: detect path traversal
attacks, and directory symlinks.
- CVE-2021-3710
-- Marc Deslauriers <email address hidden> Thu, 26 Aug 2021 10:55:40 -0400
-
apport (2.20.11-0ubuntu68) impish; urgency=medium
* data/package-hooks/source_ubiquity.py: confirm that the key exists in the
report before trying to manipulate it. (LP: #1929292)
* backends/packaging-apt-dpkg.py: check to see if there is a different
package which provides the dependency.
* test/test_report.py: with glibc 2.34 abort tests started failing as the
backtrace didn't have a program counter value in frame 1 so check frame 1
or frame 2.
-- Brian Murray <email address hidden> Thu, 19 Aug 2021 16:32:29 -0700
-
apport (2.20.11-0ubuntu67) impish; urgency=medium
* SECURITY UPDATE: Multiple arbitrary file reads (LP: #1917904)
- apport/hookutils.py: don't follow symlinks and make sure the file
isn't a FIFO in read_file().
- test/test_hookutils.py: added symlink tests.
- CVE-2021-32547, CVE-2021-32548, CVE-2021-32549, CVE-2021-32550,
CVE-2021-32551, CVE-2021-32552, CVE-2021-32553, CVE-2021-32554,
CVE-2021-32555
* SECURITY UPDATE: info disclosure via modified config files spoofing
(LP: #1917904)
- backends/packaging-apt-dpkg.py: properly terminate arguments in
get_modified_conffiles.
- CVE-2021-32556
* SECURITY UPDATE: arbitrary file write (LP: #1917904)
- data/whoopsie-upload-all: don't follow symlinks and make sure the
file isn't a FIFO in process_report().
- CVE-2021-32557
-- Marc Deslauriers <email address hidden> Tue, 18 May 2021 09:15:10 -0400
-
apport (2.20.11-0ubuntu66) impish; urgency=medium
* etc/apport/crashdb.conf: Enable Launchpad crash reports for impish.
-- Brian Murray <email address hidden> Fri, 07 May 2021 15:39:35 -0700
-
apport (2.20.11-0ubuntu65) hirsute; urgency=medium
* test/test_backend_apt_dpkg.py: libc6 recommends packages, some of which
are not installed on buildds now, so switch to testing libc-bin which only
has dependencies and is what the test is supposed to test.
-- Brian Murray <email address hidden> Wed, 14 Apr 2021 13:52:22 -0700