A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/105747 | Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2019:2091 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2019:3222 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2020:0593 | Third Party Advisory |
| https://github.com/systemd/systemd/pull/10519 | Patch Third Party Advisory |
| https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | |
| https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/201810-10 | Third Party Advisory |
| https://usn.ubuntu.com/3816-1/ | Third Party Advisory |
| https://www.exploit-db.com/exploits/45714/ | Exploit Third Party Advisory VDB Entry |
| https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-10-26 14:29
Updated : 2023-11-07 02:53
NVD link : CVE-2018-15686
Mitre link : CVE-2018-15686
CVE.ORG link : CVE-2018-15686
JSON object : View
Products Affected
debian
- debian_linux
oracle
- communications_cloud_native_core_network_function_cloud_native_environment
canonical
- ubuntu_linux
systemd_project
- systemd
CWE
CWE-502
Deserialization of Untrusted Data
