First published: Thu Apr 13 2023(Updated: )
Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation vulnerability in apport-cli when viewing crash reports and unprivileged users are allowed to run sudo less. A local attacker on a specially configured system could use this to escalate their privilege.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apport | <2.23.1-0ubuntu3.2 | 2.23.1-0ubuntu3.2 |
Ubuntu Linux | =22.10 | |
All of | ||
ubuntu/apport | <2.20.11-0ubuntu82.4 | 2.20.11-0ubuntu82.4 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/apport | <2.20.11-0ubuntu27.26 | 2.20.11-0ubuntu27.26 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/apport | <2.20.9-0ubuntu7.29 | 2.20.9-0ubuntu7.29 |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apport vulnerability is USN-6018-1.
The severity of the USN-6018-1 vulnerability is not specified.
Apport is a crash report handling tool in Ubuntu.
The vulnerability allows local attackers on a specially configured system to escalate their privilege by exploiting apport-cli when viewing crash reports and unprivileged users are allowed to run sudo less.
To fix the USN-6018-1 vulnerability in Apport, update the apport package to version 2.23.1-0ubuntu3.2 or higher.