CVE-2020-15702

Priority
Description
TOCTOU Race Condition vulnerability in apport allows a local attacker to
escalate privileges and execute arbitrary code. An attacker may exit the
crashed process and exploit PID recycling to spawn a root process with the
same PID as the crashed process, which can then be used to escalate
privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to
2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was
ZDI-CAN-11234.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (2.14.1-0ubuntu3.29+esm5)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.20.1-0ubuntu2.24)
Ubuntu 18.04 LTS (Bionic Beaver):released (2.20.9-0ubuntu7.16)
Ubuntu 20.04 LTS (Focal Fossa):released (2.20.11-0ubuntu27.6)
Ubuntu 20.10 (Groovy Gorilla):released (2.20.11-0ubuntu44)
More Information

Updated: 2020-09-10 06:36:30 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)