A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
| Link | Resource |
|---|---|
| https://github.com/systemd/systemd/pull/10519 | Patch Third Party Advisory |
| http://www.securityfocus.com/bid/105747 | Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/45714/ | Exploit Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201810-10 | Third Party Advisory |
| https://usn.ubuntu.com/3816-1/ | Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html | Mailing List Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2019:2091 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2019:3222 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2020:0593 | Third Party Advisory |
| https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E | Mailing List Third Party Advisory |
| https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-10-26 07:29
Updated : 2022-01-31 10:27
NVD link : CVE-2018-15686
Mitre link : CVE-2018-15686
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
systemd_project
- systemd
oracle
- communications_cloud_native_core_network_function_cloud_native_environment


