UBUNTU-CVE-2016-9951

Source
https://ubuntu.com/security/CVE-2016-9951
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9951.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-9951
Upstream
Downstream
Related
Published
2016-12-14T00:00:00Z
Modified
2026-02-04T02:27:29.150114Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in RespawnCommand or ProcCmdline fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.

References

Affected packages

Ubuntu:14.04:LTS / apport

Package

Name
apport
Purl
pkg:deb/ubuntu/apport@2.14.1-0ubuntu3.23?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.14.1-0ubuntu3.23

Affected versions

2.*
2.12.5-0ubuntu2
2.12.6-0ubuntu1
2.12.7-0ubuntu1
2.12.7-0ubuntu2
2.12.7-0ubuntu3
2.12.7-0ubuntu6
2.13.1-0ubuntu1
2.13.1-0ubuntu2
2.13.2-0ubuntu2
2.13.2-0ubuntu3
2.13.2-0ubuntu4
2.13.2-0ubuntu5
2.13.3-0ubuntu1
2.14-0ubuntu1
2.14.1-0ubuntu1
2.14.1-0ubuntu2
2.14.1-0ubuntu3
2.14.1-0ubuntu3.1
2.14.1-0ubuntu3.2
2.14.1-0ubuntu3.3
2.14.1-0ubuntu3.4
2.14.1-0ubuntu3.5
2.14.1-0ubuntu3.6
2.14.1-0ubuntu3.7
2.14.1-0ubuntu3.8
2.14.1-0ubuntu3.9
2.14.1-0ubuntu3.10
2.14.1-0ubuntu3.11
2.14.1-0ubuntu3.12
2.14.1-0ubuntu3.13
2.14.1-0ubuntu3.15
2.14.1-0ubuntu3.16
2.14.1-0ubuntu3.18
2.14.1-0ubuntu3.19
2.14.1-0ubuntu3.20
2.14.1-0ubuntu3.21

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport-gtk"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport-kde"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport-noui"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport-retrace"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "apport-valgrind"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "dh-apport"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "python-apport"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "python-problem-report"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "python3-apport"
        },
        {
            "binary_version": "2.14.1-0ubuntu3.23",
            "binary_name": "python3-problem-report"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9951.json"

Ubuntu:16.04:LTS / apport

Package

Name
apport
Purl
pkg:deb/ubuntu/apport@2.20.1-0ubuntu2.4?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.1-0ubuntu2.4

Affected versions

2.*
2.19.1-0ubuntu3
2.19.2-0ubuntu1
2.19.2-0ubuntu2
2.19.2-0ubuntu3
2.19.2-0ubuntu4
2.19.2-0ubuntu5
2.19.2-0ubuntu6
2.19.2-0ubuntu8
2.19.2-0ubuntu9
2.19.3-0ubuntu1
2.19.3-0ubuntu2
2.19.3-0ubuntu3
2.19.4-0ubuntu1
2.19.4-0ubuntu2
2.20-0ubuntu2
2.20-0ubuntu3
2.20.1-0ubuntu1
2.20.1-0ubuntu2
2.20.1-0ubuntu2.1
2.20.1-0ubuntu2.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport-gtk"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport-kde"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport-noui"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport-retrace"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "apport-valgrind"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "dh-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "python-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "python-problem-report"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "python3-apport"
        },
        {
            "binary_version": "2.20.1-0ubuntu2.4",
            "binary_name": "python3-problem-report"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9951.json"