CVE Vulnerabilities

CVE-2020-25860

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: Dec 21, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:H/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check.

Affected Software

NameVendorStart VersionEnd Version
RaucPengutronix*1.5 (excluding)
RaucUbuntufocal*
RaucUbuntugroovy*
RaucUbuntuhirsute*
RaucUbuntuimpish*
RaucUbuntukinetic*
RaucUbuntutrusty*
RaucUbuntuupstream*

Potential Mitigations

References