The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rauc | Pengutronix | * | 1.5 (excluding) |
Rauc | Ubuntu | groovy | * |
Rauc | Ubuntu | hirsute | * |
Rauc | Ubuntu | impish | * |
Rauc | Ubuntu | kinetic | * |
Rauc | Ubuntu | trusty | * |
Rauc | Ubuntu | upstream | * |