First published: Thu Sep 20 2012(Updated: )
A TOCTOU (time-of-check time-of-use) race condition was found in the way systemd, a system and service manager, used to update file permissions and SELinux security contexts. A local attacker could use this flaw to conduct symbolic link attacks possibly leading to their ability to modify permissions / security context of a path different than originally intended / requested. Issue found by Florian Weimer, Red Hat Product Security Team
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
systemd | <239 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4392 has been classified with high severity due to its potential to allow local attackers to modify permissions.
To fix CVE-2013-4392, update systemd to version 239 or later, where the flaw has been addressed.
CVE-2013-4392 affects versions of systemd prior to version 239.
CVE-2013-4392 is a TOCTOU (time-of-check time-of-use) race condition vulnerability.
CVE-2013-4392 cannot be exploited remotely; it requires local access to the system.