apport_project CVE Vulnerabilities & Metrics

Focus on apport_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About apport_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with apport_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total apport_project CVEs: 24
Earliest CVE date: 17 Apr 2015, 17:59 UTC
Latest CVE date: 04 Jun 2024, 22:15 UTC

Latest CVE reference: CVE-2022-28658

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 6

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical apport_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.98

Max CVSS: 9.3

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 4
7.0-8.9 6
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS apport_project CVEs

These are the five CVEs with the highest CVSS scores for apport_project, sorted by severity first and recency.

All CVEs for apport_project

CVE-2022-28658 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing

CVE-2022-28657 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

Apport does not disable python crash handler before entering chroot

CVE-2022-28656 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

is_closing_session() allows users to consume RAM in the Apport process

CVE-2022-28655 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

is_closing_session() allows users to create arbitrary tcp dbus connections

CVE-2022-28654 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

is_closing_session() allows users to fill up apport.log

CVE-2022-28652 apport_project vulnerability CVSS: 0 04 Jun 2024, 22:15 UTC

~/.config/apport/settings parsing is vulnerable to "billion laughs" attack

CVE-2019-15790 apport_project vulnerability CVSS: 2.1 28 Apr 2020, 00:15 UTC

Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3.

CVE-2020-8833 apport_project vulnerability CVSS: 1.9 22 Apr 2020, 22:15 UTC

Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown calls when the Apport cron script clears out crash files of size 0. A symlink with the same name as the deleted file can then be created upon which chown will be called, changing the file owner to root. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22.

CVE-2020-8831 apport_project vulnerability CVSS: 2.1 22 Apr 2020, 22:15 UTC

Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing directory. This allows for a symlink attack if an attacker were to create a symlink at /var/lock/apport, changing apport's lock file location. This file could then be used to escalate privileges, for example. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22.

CVE-2019-11485 apport_project vulnerability CVSS: 2.1 08 Feb 2020, 05:15 UTC

Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.

CVE-2019-11483 apport_project vulnerability CVSS: 2.1 08 Feb 2020, 05:15 UTC

Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.

CVE-2019-11482 apport_project vulnerability CVSS: 1.9 08 Feb 2020, 05:15 UTC

Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.

CVE-2019-11481 apport_project vulnerability CVSS: 6.1 08 Feb 2020, 05:15 UTC

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVE-2019-7307 apport_project vulnerability CVSS: 4.4 29 Aug 2019, 15:15 UTC

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

CVE-2018-6552 apport_project vulnerability CVSS: 7.2 31 May 2018, 22:29 UTC

Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/<global pid>/ does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc/<global pid>/ does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28.

CVE-2017-14180 apport_project vulnerability CVSS: 7.2 02 Feb 2018, 14:29 UTC

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.

CVE-2017-14179 apport_project vulnerability CVSS: 7.2 02 Feb 2018, 14:29 UTC

Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers.

CVE-2017-14177 apport_project vulnerability CVSS: 7.2 02 Feb 2018, 14:29 UTC

Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.

CVE-2017-10708 apport_project vulnerability CVSS: 6.8 18 Jul 2017, 20:29 UTC

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.

CVE-2016-9951 apport_project vulnerability CVSS: 4.3 17 Dec 2016, 03:59 UTC

An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.

CVE-2016-9950 apport_project vulnerability CVSS: 9.3 17 Dec 2016, 03:59 UTC

An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.

CVE-2016-9949 apport_project vulnerability CVSS: 9.3 17 Dec 2016, 03:59 UTC

An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.

CVE-2015-1338 apport_project vulnerability CVSS: 7.2 01 Oct 2015, 20:59 UTC

kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.

CVE-2015-1318 apport_project vulnerability CVSS: 7.2 17 Apr 2015, 17:59 UTC

The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).