Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

apport — Vulnerabilities & Security Advisories 44

All 44 CVE vulnerabilities found in apport, with AI-generated Chinese analysis, references, and POCs.

This page documents common weaknesses associated with Apport, a crash reporting utility developed by Canonical. It aggregates security vulnerabilities identified in this specific product to provide a centralized view of its security posture. The collection encompasses a wide range of vulnerability types, including buffer overflows, injection flaws, and improper input validation, spanning from the product’s initial public release through the present day. By consolidating data from various sources, including vendor advisories and third-party security researcher disclosures, this resource offers a comprehensive timeline of defects discovered in Apport. Readers can use this page to track the progression of specific advisory notices issued by Canonical regarding Apport. The interface also allows users to understand broader weakness classes by examining how specific patterns manifest within this particular tool. Furthermore, individuals can look up the complete vulnerability history of Apport to assess risk trends over time. This aggregation serves as a reference for security analysts, developers, and system administrators who need to evaluate the stability and security of Apport in their environments. The data is organized to facilitate efficient searching and filtering, enabling users to isolate relevant findings based on severity, component, or date. This approach supports informed decision-making regarding patching strategies and system hardening measures. The page remains updated as new information becomes available from reliable sources.

Vendor: Ubuntu

CVE IDTitleCVSSSeverityPublished
CVE-2025-5467 Ubuntu Apport Insecure File Permissions Vulnerability CWE-708 3.3AILowAI2025-12-10
CVE-2025-5054 Race Condition in Canonical Apport CWE-362 4.7 Medium2025-05-30
CVE-2020-11936 Apport 安全漏洞 3.1 Low2025-01-31
CVE-2022-28653 Apport 安全漏洞 5.5 -2025-01-31
CVE-2022-28658 Canonical Apport 品安全漏洞 5.5AIMediumAI2024-06-04
CVE-2022-28657 Canonical Apport 安全特征问题漏洞 4.4 -2024-06-04
CVE-2022-28656 Canonical Apport 安全漏洞 5.5 -2024-06-04
CVE-2022-28655 Canonical Apport 安全特征问题漏洞 8.1 -2024-06-04
CVE-2022-28654 Canonical Apport 安全漏洞 --2024-06-04
CVE-2022-28652 Canonical Apport 资源管理错误漏洞 6.2 -2024-06-04
CVE-2022-1242 Canonical Apport 安全特征问题漏洞 9.1 -2024-06-03
CVE-2021-3899 Canonical Apport 竞争条件问题漏洞 7.0 -2024-06-03
CVE-2023-1326 local privilege escalation in apport-cli CWE-269 7.7 High2023-04-13
CVE-2021-3710 Apport info disclosure via path traversal bug in read_file CWE-24 6.5 Medium2021-10-01
CVE-2021-3709 Apport file permission bypass through emacs byte compilation errors CWE-538 6.5 Medium2021-10-01
CVE-2021-32557 apport process_report() arbitrary file write CWE-59 5.2 Medium2021-06-12
CVE-2021-32556 apport get_modified_conffiles() function command injection CWE-78 3.8 Low2021-06-12
CVE-2021-32555 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32554 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32553 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32552 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32551 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32550 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32549 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32548 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-32547 apport read_file() function could follow maliciously constructed symbolic links CWE-59 7.3 High2021-06-12
CVE-2021-25684 apport can be stalled by reading a FIFO CWE-20 8.8 High2021-06-11
CVE-2021-25683 apport improperly parses /proc/pid/stat CWE-20 8.8 High2021-06-11
CVE-2021-25682 apport improperly parses /proc/pid/status CWE-20 8.8 High2021-06-11
CVE-2020-15702 TOCTOU in apport CWE-367 7.0 High2020-08-06

All 44 known CVE vulnerabilities affecting apport with full Chinese analysis, references, and POCs where available.