Bug 1210451 (CVE-2023-1326) - VUL-0: CVE-2023-1326: apport,apport-crashdb-sle: privilege escalation via apport-cli if sudo is allowed
Summary: VUL-0: CVE-2023-1326: apport,apport-crashdb-sle: privilege escalation via app...
Status: IN_PROGRESS
Alias: CVE-2023-1326
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/363436/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-1326:6.7:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-14 08:34 UTC by Carlos López
Modified: 2023-07-03 16:14 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2023-04-14 08:34:41 UTC
CVE-2023-1326

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1326
https://www.cve.org/CVERecord?id=CVE-2023-1326
http://www.cvedetails.com/cve/CVE-2023-1326/
https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb