Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2914 articles · 109744 vulns · 38/41 feeds (7d)
← Back to list
6.7
CVE-2026-4878
red hat · red hat enterprise linux

Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()

Description

A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.

Affected Products

VendorProductVersions
red hatred hat enterprise linux—

References

  • https://access.redhat.com/security/cve/CVE-2026-4878(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2447554
  • https://bugzilla.redhat.com/show_bug.cgi?id=2451615(issue-tracking, x_refsource_REDHAT)

Related News (2 articles)

Tier C
oss-security1d ago
Re: libcap-2.77 (since libcap-2.04) has TOCTOU privilege escalation issue
→ No new info (linked only)
Tier C
VulDB2d ago
CVE-2026-4878 | libcap up to 2.77 cap_set_file allocation of resources
→ No new info (linked only)
CVSS 3.16.7 NONE
CISA KEV❌ No
Actively exploited❌ No
CWECWE-367
PublishedApr 9, 2026
Last enriched20h ago
Trending Score34
Source articles2
Independent2
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 42
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 41
NONECVE-2026-4282EXP
Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw
Trending: 35
NONECVE-2026-3872EXP
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass
Trending: 35
NONECVE-2025-58713
Rhpam: privilege escalation via excessive /etc/passwd permissions
Trending: 33

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026