USN-5077-2: Apport vulnerabilities
14 September 2021
Several security issues were fixed in Apport.
Releases
Packages
- apport - automatically generate crash reports for debugging
Details
USN-5077-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Maik Münch and Stephen Röttger discovered that Apport incorrectly handled
certain information gathering operations. A local attacker could use this
issue to gain read access to arbitrary files, possibly containing sensitive
information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
apport
-
2.20.1-0ubuntu2.30+esm2
Available with Ubuntu Pro
-
python-apport
-
2.20.1-0ubuntu2.30+esm2
Available with Ubuntu Pro
-
python3-apport
-
2.20.1-0ubuntu2.30+esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
apport
-
2.14.1-0ubuntu3.29+esm8
Available with Ubuntu Pro
-
python-apport
-
2.14.1-0ubuntu3.29+esm8
Available with Ubuntu Pro
-
python3-apport
-
2.14.1-0ubuntu3.29+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5077-1: python3-problem-report, python-problem-report, apport-gtk, python-apport, python3-apport, apport, apport-kde, apport-valgrind, dh-apport, apport-noui, apport-retrace