2018-01-15 14:50
CVE-2017-7572 backintime
2017-10-23 14:18
2017-07-20 21:30
2017-06-16 19:22
2017-05-10 23:47
2017-04-14 10:21
2017-04-07 00:03


The _checkPolkitPrivilege function in in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc//status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful backintime None
devel backintime None
trusty backintime None
xenial backintime None


Release Package Reason
precise backintime ignored
precise/esm backintime DNE
vivid/stable-phone-overlay backintime DNE
vivid/ubuntu-core backintime DNE
yakkety backintime ignored
zesty backintime ignored

Needs Triage

Release Package Reason
upstream backintime needs-triage