Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4878

Опубликовано: 06 апр. 2026
Источник: redhat
CVSS3: 6.7

Описание

A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the cap_set_file() function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.

Отчет

This is an Important flaw. A Time-of-Check-to-Time-of-Use (TOCTOU) race condition in libcap's cap_set_file() allows a local unprivileged user to escalate privileges. An attacker with write access to a parent directory can exploit a narrow window during file capability updates to redirect capabilities to an attacker-controlled file. This can lead to the injection of elevated privileges into an unintended executable when privileged processes, such as setcap or container tooling, invoke cap_set_file() on attacker-influenced paths.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libcapAffected
Red Hat Enterprise Linux 6compat-libcap1Affected
Red Hat Enterprise Linux 6libcapOut of support scope
Red Hat Enterprise Linux 7compat-libcap1Affected
Red Hat Enterprise Linux 7libcapAffected
Red Hat Enterprise Linux 8libcapAffected
Red Hat Enterprise Linux 9libcapAffected
Red Hat Hardened ImageslibcapAffected
Red Hat OpenShift Container Platform 4rhcosAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2451615libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
8 дней назад

[Address a potential TOCTOU race condition in cap_set_file()]

CVSS3: 6.7
nvd
5 дней назад

A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.

msrc
4 дня назад

Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()

CVSS3: 6.7
debian
5 дней назад

A flaw was found in libcap. A local unprivileged user can exploit a Ti ...

6.7 Medium

CVSS3