A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105747 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:2091 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3222 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0593 | Third Party Advisory |
https://github.com/systemd/systemd/pull/10519 | Patch Third Party Advisory |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201810-10 | Third Party Advisory |
https://usn.ubuntu.com/3816-1/ | Third Party Advisory |
https://www.exploit-db.com/exploits/45714/ | Exploit Third Party Advisory VDB Entry |
https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-10-26 14:29
Updated : 2023-11-07 02:53
NVD link : CVE-2018-15686
Mitre link : CVE-2018-15686
CVE.ORG link : CVE-2018-15686
JSON object : View
Products Affected
debian
- debian_linux
oracle
- communications_cloud_native_core_network_function_cloud_native_environment
canonical
- ubuntu_linux
systemd_project
- systemd
CWE
CWE-502
Deserialization of Untrusted Data