Home

Description

An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. * overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.

PUBLISHED Reserved 2026-02-05 | Published 2026-02-25 | Updated 2026-02-25 | Assigner suse




HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-377: Insecure Temporary File

Product status

Default status
unaffected

? (git) before 5880246d3a02642dc68f5c8cb474bf63cdb56bca
affected

Credits

Matthias Gerstner of SUSE finder

References

bugzilla.suse.com/show_bug.cgi?id=1258241

cve.org (CVE-2026-25701)

nvd.nist.gov (CVE-2026-25701)

Download JSON