CVE-2020-10174

Source
https://cve.org/CVERecord?id=CVE-2020-10174
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10174.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-10174
Downstream
Published
2020-03-05T16:15:11.940Z
Modified
2026-02-11T12:23:47.085041Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a preexisting temporary directory in the predictable location /tmp/timeshift. It follows symlinks in this location or uses directories owned by unprivileged users. Because Timeshift also executes scripts under this location, an attacker can attempt to win a race condition to replace scripts created by Timeshift with attacker-controlled scripts. Upon success, an attacker-controlled script is executed with full root privileges. This logic is practically always triggered when Timeshift runs regardless of the command-line arguments used.

References

Affected packages

Git / github.com/teejee2008/timeshift

Affected ranges

Type
GIT
Repo
https://github.com/teejee2008/timeshift
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v17.*
v17.10
v17.11
v17.2
v18.*
v18.1
v18.1.1
v18.2
v18.4
v18.6
v18.6.1
v18.8
v18.9
v18.9.1
v19.*
v19.01
v19.08.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10174.json"