A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
References | () https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb - Patch | |
References | () https://ubuntu.com/security/notices/USN-6018-1 - Vendor Advisory |
Information
Published : 2023-04-13 23:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-1326
Mitre link : CVE-2023-1326
CVE.ORG link : CVE-2023-1326
JSON object : View
Products Affected
canonical
- apport
- ubuntu_linux
CWE
CWE-269
Improper Privilege Management