Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:0954

Опубликовано: 06 апр. 2023
Источник: rocky
Оценка: Moderate

Описание

Moderate: systemd security update

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)

  • systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
systemdx86_6412.el9_1.3systemd-250-12.el9_1.3.x86_64.rpm
systemd-containerx86_6412.el9_1.3systemd-container-250-12.el9_1.3.x86_64.rpm
systemd-libsx86_6412.el9_1.3systemd-libs-250-12.el9_1.3.x86_64.rpm
systemd-oomdx86_6412.el9_1.3systemd-oomd-250-12.el9_1.3.x86_64.rpm
systemd-pamx86_6412.el9_1.3systemd-pam-250-12.el9_1.3.x86_64.rpm
systemd-resolvedx86_6412.el9_1.3systemd-resolved-250-12.el9_1.3.x86_64.rpm
systemd-rpm-macrosnoarch12.el9_1.3systemd-rpm-macros-250-12.el9_1.3.noarch.rpm
systemd-udevx86_6412.el9_1.3systemd-udev-250-12.el9_1.3.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 2 лет назад

ELSA-2023-0954: systemd security update (MODERATE)

CVSS3: 5.5
ubuntu
больше 2 лет назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
redhat
почти 3 года назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
nvd
больше 2 лет назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
msrc
больше 2 лет назад

Описание отсутствует