UBUNTU-CVE-2017-7572

Source
https://ubuntu.com/security/CVE-2017-7572
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7572.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-7572
Upstream
Published
2017-04-06T18:59:00Z
Modified
2025-07-16T07:37:11.281587Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.

References

Affected packages

Ubuntu:18.04:LTS / backintime

Package

Name
backintime
Purl
pkg:deb/ubuntu/backintime@1.1.12-2?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.12-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "backintime-common",
            "binary_version": "1.1.12-2"
        },
        {
            "binary_name": "backintime-gnome",
            "binary_version": "1.1.12-2"
        },
        {
            "binary_name": "backintime-kde",
            "binary_version": "1.1.12-2"
        },
        {
            "binary_name": "backintime-qt4",
            "binary_version": "1.1.12-2"
        }
    ]
}