Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3843

Опубликовано: 26 апр. 2019
Источник: debian

Описание

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed242-1experimentalpackage
systemdfixed242-4package
systemdignoredbusterpackage
systemdignoredstretchpackage
systemdnot-affectedjessiepackage

Примечания

  • https://github.com/systemd/systemd/commit/3c27973b13724ede05a06a5d346a569794cda433

  • https://github.com/systemd/systemd/commit/f69567cbe26d09eac9d387c0be0fc32c65a83ada

  • https://github.com/systemd/systemd/commit/9d880b70ba5c6ca83c82952f4c90e86e56c7b70c

  • https://github.com/systemd/systemd/commit/7445db6eb70e8d5989f481d0c5a08ace7047ae5b

  • https://github.com/systemd/systemd/commit/62aa29247c3d74bcec0607c347f2be23cd90675d

  • https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=1771

  • https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1814596

  • https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

CVSS3: 4.5
redhat
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

CVSS3: 7.8
nvd
почти 7 лет назад

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

CVSS3: 7.8
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 7.8
github
больше 3 лет назад

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.