CVE-2020-15702
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/08/2020
Last modified:
03/11/2025
Description
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://usn.ubuntu.com/4449-1
- https://usn.ubuntu.com/4449-1/
- https://usn.ubuntu.com/4449-2/
- https://www.zerodayinitiative.com/advisories/ZDI-20-979/
- http://seclists.org/fulldisclosure/2025/Jun/9
- https://usn.ubuntu.com/4449-1
- https://usn.ubuntu.com/4449-1/
- https://usn.ubuntu.com/4449-2/
- https://www.zerodayinitiative.com/advisories/ZDI-20-979/



