CVE-2020-15702

Published: 04 August 2020

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

Priority

Medium

CVSS 3 base score: 7.0

Status

Package Release Status
apport
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.04 LTS (Focal Fossa)
Released (2.20.11-0ubuntu27.6)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.20.9-0ubuntu7.16)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.20.1-0ubuntu2.24)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.14.1-0ubuntu3.29+esm5)