Bug 2452021 (CVE-2026-33711)
| Summary: | CVE-2026-33711 incus: Incus: Local privilege escalation or denial of service via predictable temporary file paths | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in Incus, a system container and virtual machine manager. A local attacker could exploit a vulnerability in the API responsible for retrieving VM screenshots. By creating symbolic links (symlinks) in predictable temporary file paths, an attacker could trick Incus into truncating and altering arbitrary files on the filesystem. This could lead to a denial of service or, in specific configurations where the `protected_symlinks` kernel security feature is disabled, a local privilege escalation.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2452045, 2452046 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-03-26 23:02:05 UTC
|