Lucene search

K
ubuntuUbuntuUSN-6018-1
HistoryApr 13, 2023 - 12:00 a.m.

Apport vulnerability

2023-04-1300:00:00
ubuntu.com
34
ubuntu
apport
privilege escalation
vulnerability
crash reports
debugging
local attacker
sudo less
security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Releases

  • Ubuntu 22.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • apport - automatically generate crash reports for debugging

Details

Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.

OSVersionArchitecturePackageVersionFilename
Ubuntu22.10noarchapport< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchapport-gtk< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchapport-kde< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchapport-noui< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchapport-retrace< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchapport-valgrind< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchdh-apport< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchpython3-apport< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.10noarchpython3-problem-report< 2.23.1-0ubuntu3.2UNKNOWN
Ubuntu22.04noarchapport< 2.20.11-0ubuntu82.4UNKNOWN
Rows per page:
1-10 of 381

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%