First published: Wed Feb 14 2018(Updated: )
OpenRC opentmpfiles through 0.1.3, when the fs.protected_hardlinks sysctl is turned off, allows local users to obtain ownership of arbitrary files by creating a hard link inside a directory on which "chown -R" will be run.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | <=0.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18188 is considered a moderate severity vulnerability as it allows local users to potentially take ownership of arbitrary files.
To mitigate CVE-2017-18188, ensure that the fs.protected_hardlinks sysctl setting is enabled.
CVE-2017-18188 affects OpenRC opentmpfiles versions up to and including 0.1.3.
No, CVE-2017-18188 can only be exploited by local users with access to the system.
In addition to enabling fs.protected_hardlinks, regularly update OpenRC opentmpfiles to ensure any security patches are applied.