First published: Thu Apr 13 2023(Updated: )
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/apport | <2.20.9-0ubuntu7.29 | 2.20.9-0ubuntu7.29 |
ubuntu/apport | <2.20.11-0ubuntu27.26 | 2.20.11-0ubuntu27.26 |
ubuntu/apport | <2.20.11-0ubuntu82.4 | 2.20.11-0ubuntu82.4 |
ubuntu/apport | <2.23.1-0ubuntu3.2 | 2.23.1-0ubuntu3.2 |
ubuntu/apport | <2.26.1-0ubuntu2 | 2.26.1-0ubuntu2 |
ubuntu/apport | <2.26.1 | 2.26.1 |
Canonical Apport | <=2.26.0 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =22.04 | |
Ubuntu Linux | =22.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1326 is a privilege escalation attack found in apport-cli 2.26.0 and earlier.
CVE-2023-1326 has a severity rating of 7.8 (high).
The affected software versions include apport-cli 2.26.0 and earlier, as well as Canonical Apport, and various versions of Canonical Ubuntu Linux (18.04, 20.04, 22.04, and 22.10).
To fix CVE-2023-1326, you should update to the latest version of apport (2.26.1 for Ubuntu) or apply the recommended security patches provided by Canonical Ubuntu Linux.
You can find more information about CVE-2023-1326 on the Debian security tracker, GitHub repository of Canonical Apport, and the Ubuntu security notices.