Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:3837

Опубликовано: 31 авг. 2023
Источник: rocky
Оценка: Moderate

Описание

Moderate: systemd security and bug fix update

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd: privilege escalation via the less pager (CVE-2023-26604)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
systemdx86_6474.el8_8.2systemd-239-74.el8_8.2.x86_64.rpm
systemd-containerx86_6474.el8_8.2systemd-container-239-74.el8_8.2.x86_64.rpm
systemd-develx86_6474.el8_8.2systemd-devel-239-74.el8_8.2.x86_64.rpm
systemd-journal-remotex86_6474.el8_8.2systemd-journal-remote-239-74.el8_8.2.x86_64.rpm
systemd-libsx86_6474.el8_8.2systemd-libs-239-74.el8_8.2.x86_64.rpm
systemd-pamx86_6474.el8_8.2systemd-pam-239-74.el8_8.2.x86_64.rpm
systemd-testsx86_6474.el8_8.2systemd-tests-239-74.el8_8.2.x86_64.rpm
systemd-udevx86_6474.el8_8.2systemd-udev-239-74.el8_8.2.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.

CVSS3: 6.3
redhat
больше 2 лет назад

systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.

CVSS3: 7.8
nvd
больше 2 лет назад

systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

systemd before 247 does not adequately block local privilege escalatio ...