Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-15702

Published: 4 August 2020

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

Priority

Medium

CVSS 3 base score: 7.0

Status

Package Release Status
apport
Launchpad, Ubuntu, Debian
bionic
Released (2.20.9-0ubuntu7.16)
eoan Ignored
(reached end-of-life)
focal
Released (2.20.11-0ubuntu27.6)
precise Does not exist

trusty
Released (2.14.1-0ubuntu3.29+esm5)
upstream Needs triage

xenial
Released (2.20.1-0ubuntu2.24)