CVE-2023-1326

Publication date 13 April 2023

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.8 · High

Score breakdown

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

Status

Package Ubuntu Release Status
apport 23.04 lunar
Fixed 2.26.1-0ubuntu2
22.10 kinetic
Fixed 2.23.1-0ubuntu3.2
22.04 LTS jammy
Fixed 2.20.11-0ubuntu82.4
20.04 LTS focal
Fixed 2.20.11-0ubuntu27.26
18.04 LTS bionic
Fixed 2.20.9-0ubuntu7.29
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
apport

Severity score breakdown

Parameter Value
Base score 7.8 · High
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

Other references