This bug was fixed in the package apport - 2.33.0-0ubuntu1
---------------
apport (2.33.0-0ubuntu1) questing; urgency=medium
* New upstream release
- SECURITY UPDATE: Report file insecure permissions (LP: #2106338)
+ Do not change report group to report owner's primary group.
+ CVE-2025-5467
- SECURITY UPDATE: Race condition when forwarding core files to containers
(LP: #2107472)
+ apport: move consistency_checks call further up
+ apport: do not override options.pid
+ apport: open /proc/<pid> as early as possible
+ fileutils: respect proc_pid_fd in get_core_path
+ apport: use opened /proc/<pid> everywhere
+ apport: do consistency check before forwarding crashes
+ apport: require --dump-mode to be specified
+ apport: determine report owner by dump_mode
+ apport: do not forward crash for dump_mode == 2
+ apport: support pidfd (%F) parameter from kernel
+ CVE-2025-5054
- test: support coreutils rename to gnu-coreutils (LP: #2111595)
- setuptools/java: use snakecase for option name (LP: #2111595)
- apport: look for the exe within the proc root mount (LP: #2112272)
* Depend on gnu-coreutils for integration/system tests
* Depend on python3-pytest-cov in addition to python3-pytest
* Drop patches applied upstream and refresh remaining patches
* Address some Pyright complaints in ubuntu general hook
-- Benjamin Drung <[email protected]> Fri, 06 Jun 2025 13:53:15 +0200
** Changed in: apport (Ubuntu)
Status: In Progress => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-5054
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-5467
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2112272
Title:
Apport refuses to generate core dumps inside containers
To manage notifications about this bug go to:
https://bugs.launchpad.net/apport/+bug/2112272/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs