CVE-2023-1326
HIGHCanonical Apport < 2.26.0 - Improper Privilege Management
Title source: ruleDescription
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
Exploits (4)
References (2)
Core 2
Core References
Vendor Advisory vendor-advisory
https://ubuntu.com/security/notices/USN-6018-1
Scores
CVSS v3
7.7
EPSS
0.0505
EPSS Percentile
89.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-269
Status
published
Products (5)
canonical/apport
< 2.26.0
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
20.04
canonical/ubuntu_linux
22.04
canonical/ubuntu_linux
22.10
Published
Apr 13, 2023
Tracked Since
Feb 18, 2026