A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
References
Link | Resource |
---|---|
https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2 | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2020/02/05/1 | Mailing List Patch Third Party Advisory |
https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712 | Issue Tracking Patch Third Party Advisory |
https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb | Patch Third Party Advisory |
https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-03-31 10:15
Updated : 2022-11-29 08:25
NVD link : CVE-2020-1712
Mitre link : CVE-2020-1712
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
systemd_project
- systemd
redhat
- enterprise_linux
- discovery
- openshift_container_platform
- migration_toolkit
- ceph_storage
debian
- debian_linux