← Back to CVEs
CVE-2026-4878
MEDIUM6.7
Description
A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.
CVE Details
CVSS v3.1 Score6.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredLOW
User InteractionREQUIRED
Published4/9/2026
Last Modified4/9/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-367
References
https://access.redhat.com/security/cve/CVE-2026-4878(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2447554(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2451615(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2026/04/07/14(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2026/04/07/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2026/04/08/9(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2026/04/09/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2026/04/09/6(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.