[Bug 2114137] Re: [SRU] SRU 2.33
Anshul Singh
2114137 at bugs.launchpad.net
Thu Jun 12 07:15:43 UTC 2025
** Description changed:
- * New upstream release
- - SECURITY UPDATE: Report file insecure permissions (LP: #2106338)
- + Do not change report group to report owner's primary group.
- + CVE-2025-5467
- - SECURITY UPDATE: Race condition when forwarding core files to containers
- (LP: #2107472)
- + apport: move consistency_checks call further up
- + apport: do not override options.pid
- + apport: open /proc/<pid> as early as possible
- + fileutils: respect proc_pid_fd in get_core_path
- + apport: use opened /proc/<pid> everywhere
- + apport: do consistency check before forwarding crashes
- + apport: require --dump-mode to be specified
- + apport: determine report owner by dump_mode
- + apport: do not forward crash for dump_mode == 2
- + apport: support pidfd (%F) parameter from kernel
- + CVE-2025-5054
- - test: support coreutils rename to gnu-coreutils (LP: #2111595)
- - setuptools/java: use snakecase for option name (LP: #2111595)
- - apport: look for the exe within the proc root mount (LP: #2112272)
- * Depend on gnu-coreutils for integration/system tests
- * Depend on python3-pytest-cov in addition to python3-pytest
- * Drop patches applied upstream and refresh remaining patches
- * Address some Pyright complaints in ubuntu general hook
+ * New upstream release
+ - SECURITY UPDATE: Report file insecure permissions (LP: #2106338)
+ + Do not change report group to report owner's primary group.
+ + CVE-2025-5467
+ - SECURITY UPDATE: Race condition when forwarding core files to containers
+ (LP: #2107472)
+ + apport: move consistency_checks call further up
+ + apport: do not override options.pid
+ + apport: open /proc/<pid> as early as possible
+ + fileutils: respect proc_pid_fd in get_core_path
+ + apport: use opened /proc/<pid> everywhere
+ + apport: do consistency check before forwarding crashes
+ + apport: require --dump-mode to be specified
+ + apport: determine report owner by dump_mode
+ + apport: do not forward crash for dump_mode == 2
+ + apport: support pidfd (%F) parameter from kernel
+ + CVE-2025-5054
+ - test: support coreutils rename to gnu-coreutils (LP: #2111595)
+ - setuptools/java: use snakecase for option name (LP: #2111595)
+ - apport: look for the exe within the proc root mount (LP: #2112272)
+ * Depend on gnu-coreutils for integration/system tests
+ * Depend on python3-pytest-cov in addition to python3-pytest
+ * Drop patches applied upstream and refresh remaining patches
+ * Address some Pyright complaints in ubuntu general hook
+
+
+ [ Impact ]
+ * The bug fixes for LP #2080499 and LP #2112466 need SRUs to Noble
** Summary changed:
- [SRU] SRU 2.33
+ [SRU] SRU 2.33.0-0ubuntu1 to Noble
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/2114137
Title:
[SRU] SRU 2.33.0-0ubuntu1 to Noble
Status in apport package in Ubuntu:
New
Bug description:
* New upstream release
- SECURITY UPDATE: Report file insecure permissions (LP: #2106338)
+ Do not change report group to report owner's primary group.
+ CVE-2025-5467
- SECURITY UPDATE: Race condition when forwarding core files to containers
(LP: #2107472)
+ apport: move consistency_checks call further up
+ apport: do not override options.pid
+ apport: open /proc/<pid> as early as possible
+ fileutils: respect proc_pid_fd in get_core_path
+ apport: use opened /proc/<pid> everywhere
+ apport: do consistency check before forwarding crashes
+ apport: require --dump-mode to be specified
+ apport: determine report owner by dump_mode
+ apport: do not forward crash for dump_mode == 2
+ apport: support pidfd (%F) parameter from kernel
+ CVE-2025-5054
- test: support coreutils rename to gnu-coreutils (LP: #2111595)
- setuptools/java: use snakecase for option name (LP: #2111595)
- apport: look for the exe within the proc root mount (LP: #2112272)
* Depend on gnu-coreutils for integration/system tests
* Depend on python3-pytest-cov in addition to python3-pytest
* Drop patches applied upstream and refresh remaining patches
* Address some Pyright complaints in ubuntu general hook
[ Impact ]
* The bug fixes for LP #2080499 and LP #2112466 need SRUs to Noble
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2114137/+subscriptions
More information about the foundations-bugs
mailing list