USN-6018-1: Apport vulnerability

Publication date

13 April 2023

Overview

Apport could be used to escalate privilege on specially configured systems.


Packages

  • apport - automatically generate crash reports for debugging

Details

Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.

Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.10 kinetic apport –  2.23.1-0ubuntu3.2
22.04 jammy apport –  2.20.11-0ubuntu82.4
20.04 focal apport –  2.20.11-0ubuntu27.26
18.04 bionic apport –  2.20.9-0ubuntu7.29

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›