vulnerability
Arch Linux: Arbitrary file overwrite (CVE-2017-8108)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Jun 8, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 8, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Michael Scherer discovered that some Lynis tests reuse the same temporary file. As some tests remove the temporary file, this might give an attacker the possibility to perform a link following attack. While timing must be perfect, there is a very small time window in which the attack can recreate the temporary file and symlink it to another resource, like a file. In this case data may be overwritten, or possibly executed.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-8108
- https://attackerkb.com/topics/CVE-2017-8108
- URL-http://www.securityfocus.com/bid/99288
- URL-https://cisofy.com/security/cve/cve-2017-8108/
- URL-https://github.com/CISOfy/lynis/releases/tag/2.5.0
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJXMPYANXHI25NQZ36QMXNXANDRAA5YG/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJHLLWNW7NASVXCK24YBSIUQQPWGCMB5/
- URL-https://security.archlinux.org/ASA-201705-20
- CWE-59
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.