USN-7545-1: Apport vulnerability

Publication date

29 May 2025

Overview

Apport could be made to leak sensitive information.


Packages

  • apport - automatically generate crash reports for debugging

Details

Qualys discovered that Apport incorrectly handled metadata when
processing application crashes. An attacker could possibly use this issue
to leak sensitive information.

Qualys discovered that Apport incorrectly handled metadata when
processing application crashes. An attacker could possibly use this issue
to leak sensitive information.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
25.04 plucky apport –  2.32.0-0ubuntu5.1
python3-apport –  2.32.0-0ubuntu5.1
24.10 oracular apport –  2.30.0-0ubuntu4.3
python3-apport –  2.30.0-0ubuntu4.3
24.04 noble apport –  2.28.1-0ubuntu3.6
python3-apport –  2.28.1-0ubuntu3.6
22.04 jammy apport –  2.20.11-0ubuntu82.7
python3-apport –  2.20.11-0ubuntu82.7
20.04 focal apport –  2.20.11-0ubuntu27.28
python3-apport –  2.20.11-0ubuntu27.28
18.04 bionic apport –  2.20.9-0ubuntu7.29+esm1  
python-apport –  2.20.9-0ubuntu7.29+esm1  
python3-apport –  2.20.9-0ubuntu7.29+esm1  
16.04 xenial apport –  2.20.1-0ubuntu2.30+esm5  
python-apport –  2.20.1-0ubuntu2.30+esm5  
python3-apport –  2.20.1-0ubuntu2.30+esm5  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›