CVE Vulnerabilities

CVE-2020-25860

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: Dec 21, 2020 | Modified: Dec 29, 2020
CVSS 3.x
6.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:H/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.

Affected Software

Name Vendor Start Version End Version
Rauc Pengutronix * 1.5 (excluding)
Rauc Ubuntu groovy *
Rauc Ubuntu hirsute *
Rauc Ubuntu impish *
Rauc Ubuntu kinetic *
Rauc Ubuntu trusty *
Rauc Ubuntu upstream *

Potential Mitigations

References