Описание
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 237-3ubuntu10.38 |
| cosmic | ignored | end of life |
| devel | not-affected | 244.1-0ubuntu2 |
| disco | ignored | end of life |
| eoan | not-affected | 242-7ubuntu3.2 |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | released | 237-3ubuntu10.38 |
| esm-infra/xenial | not-affected | code not present |
| precise/esm | DNE | |
| trusty/esm | not-affected | code not present |
Показывать по
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
It was discovered that a systemd service that uses DynamicUser propert ...
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
4.6 Medium
CVSS2
7.8 High
CVSS3