[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.4 (Accepted)

Steve Beattie sbeattie at ubuntu.com
Wed Dec 14 22:00:45 UTC 2016


apport (2.20.1-0ubuntu2.4) xenial-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: code execution via malicious crash files
    - Use ast.literal_eval in apport/ui.py, added test to test/test_ui.py.
    - No CVE number
    - LP: #1648806
  * SECURITY UPDATE: path traversal vulnerability with hooks execution
    - Clean path in apport/report.py, added test to test/test_ui.py.
    - No CVE number
    - LP: #1648806

  [ Steve Beattie ]
  * SECURITY UPDATE: code execution via malicious crash files
    - Only offer restarting the application when processing a
      crash file in /var/crash in apport/ui.py, gtk/apport-gtk,
      and kde/apport-kde. Add testcases to test/test_ui.py,
      test/test_ui_gtk.py, and test_ui_kde.py.
    - No CVE number
    - LP: #1648806

Date: 2016-12-13 20:59:13.370061+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Maintainer: Martin Pitt <martin.pitt at ubuntu.com>
Signed-By: Steve Beattie <sbeattie at ubuntu.com>
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.4
-------------- next part --------------
Sorry, changesfile not available.


More information about the Xenial-changes mailing list