[ Marc Deslauriers ]
* SECURITY UPDATE: path traversal vulnerability with hooks execution
- Clean path in apport/report.py, added test to test/test_ui.py.
- No CVE number
- LP: #1648806
[ Steve Beattie ]
* SECURITY UPDATE: code execution via malicious crash files
- Only offer restarting the application when processing a
crash file in /var/crash in apport/ui.py, gtk/apport-gtk,
and kde/apport-kde. Add testcases to test/test_ui.py,
test/test_ui_gtk.py, and test_ui_kde.py.
- No CVE number
- LP: #1648806
-- Marc Deslauriers <email address hidden> Mon, 12 Dec 2016 07:34:52 -0500
This bug was fixed in the package apport - 2.0.1-0ubuntu17.15
--------------- 0ubuntu17. 15) precise-security; urgency=medium
apport (2.0.1-
[ Marc Deslauriers ]
* SECURITY UPDATE: path traversal vulnerability with hooks execution
- Clean path in apport/report.py, added test to test/test_ui.py.
- No CVE number
- LP: #1648806
[ Steve Beattie ] test_ui_ gtk.py, and test_ui_kde.py.
* SECURITY UPDATE: code execution via malicious crash files
- Only offer restarting the application when processing a
crash file in /var/crash in apport/ui.py, gtk/apport-gtk,
and kde/apport-kde. Add testcases to test/test_ui.py,
test/
- No CVE number
- LP: #1648806
-- Marc Deslauriers <email address hidden> Mon, 12 Dec 2016 07:34:52 -0500