TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
References
Link | Resource |
---|---|
https://usn.ubuntu.com/4449-1 | Vendor Advisory |
https://usn.ubuntu.com/4449-1/ | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-979/ | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/4449-2/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Information
Published : 2020-08-06 16:15
Updated : 2023-01-27 10:19
NVD link : CVE-2020-15702
Mitre link : CVE-2020-15702
JSON object : View
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
Products Affected
canonical
- apport
- ubuntu_linux