A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
Link | Resource |
---|---|
https://github.com/systemd/systemd/pull/10519 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/105747 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/45714/ | Exploit Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201810-10 | Third Party Advisory |
https://usn.ubuntu.com/3816-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2091 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3222 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0593 | Third Party Advisory |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E | Mailing List Third Party Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-10-26 07:29
Updated : 2022-01-31 10:27
NVD link : CVE-2018-15686
Mitre link : CVE-2018-15686
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
systemd_project
- systemd
oracle
- communications_cloud_native_core_network_function_cloud_native_environment