CVE-2022-28657

7.8 HIGH

📋 TL;DR

This vulnerability in Apport's crash reporting tool allows local attackers to escape chroot restrictions by exploiting the Python crash handler. It affects Ubuntu systems where Apport is enabled, potentially allowing privilege escalation or unauthorized file access.

💻 Affected Systems

Products:
  • Apport
Versions: Apport versions prior to 2.20.11-0ubuntu82.1
Operating Systems: Ubuntu 22.04 LTS (Jammy Jellyfish)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Apport enabled (default on Ubuntu desktop installations)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, allowing complete system compromise and data exfiltration.

🟠

Likely Case

Local user gains unauthorized access to files outside chroot jail, potentially reading sensitive system files.

🟢

If Mitigated

No impact if Apport is disabled or system is patched; chroot isolation remains effective.

🌐 Internet-Facing: LOW (requires local access to exploit)
🏢 Internal Only: MEDIUM (any local user could potentially exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger a Python crash within Apport's chroot environment

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apport 2.20.11-0ubuntu82.1

Vendor Advisory: https://ubuntu.com/security/notices/USN-5427-1

Restart Required: No

Instructions:

1. Update package list: sudo apt update
2. Upgrade Apport: sudo apt install --only-upgrade apport
3. Verify installation: apt-cache policy apport

🔧 Temporary Workarounds

Disable Apport

linux

Completely disable Apport crash reporting to eliminate the vulnerability

sudo systemctl stop apport
sudo systemctl disable apport

🧯 If You Can't Patch

  • Disable Apport service completely
  • Restrict local user access to systems with Apport enabled

🔍 How to Verify

Check if Vulnerable:

Check Apport version: dpkg -l | grep apport

Check Version:

dpkg -l apport | grep ^ii

Verify Fix Applied:

Verify version is 2.20.11-0ubuntu82.1 or later: dpkg -l apport

📡 Detection & Monitoring

Log Indicators:

  • Unusual Apport crash reports
  • Python crash handler errors in system logs

Network Indicators:

  • None (local exploit only)

SIEM Query:

process:apport AND (event:crash OR event:chroot)

🔗 References

📤 Share & Export