Vulnerabilites related to systemd - systemd
CVE-2012-1101 (GCVE-0-2012-1101)
Vulnerability from cvelistv5
Published
2020-03-11 14:58
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1101" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/05/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cgit.freedesktop.org/systemd/systemd/commit/?id=9a46fc3b9014de1bf0ed1f3004a536b08a19ebb3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "systemd", "vendor": "systemd", "versions": [ { "status": "affected", "version": "37-1" } ] } ], "datePublic": "2011-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure)." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-11T14:58:57", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1101" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/05/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cgit.freedesktop.org/systemd/systemd/commit/?id=9a46fc3b9014de1bf0ed1f3004a536b08a19ebb3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662029" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1101", "datePublished": "2020-03-11T14:58:57", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15688 (GCVE-0-2018-15688)
Vulnerability from cvelistv5
Published
2018-10-26 14:00
Modified
2025-06-09 15:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- dhcp6_option_append_ia() contained an incorrect buffer size calculation.
Summary
A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "USN-3807-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3807-1/" }, { "name": "USN-3806-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3806-1/" }, { "name": "RHSA-2018:3665", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3665" }, { "name": "105745", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105745" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/systemd/systemd/pull/10518" }, { "name": "RHSA-2019:0049", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0049" }, { "name": "RHBA-2019:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15688", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:55:22.388769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:55:41.023Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "systemd", "vendor": "systemd", "versions": [ { "lessThanOrEqual": "239", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Felix Wilhelm from the Google Security Team" } ], "datePublic": "2018-10-25T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "dhcp6_option_append_ia() contained an incorrect buffer size calculation.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-24T05:06:03.000Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "USN-3807-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3807-1/" }, { "name": "USN-3806-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3806-1/" }, { "name": "RHSA-2018:3665", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3665" }, { "name": "105745", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105745" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/systemd/systemd/pull/10518" }, { "name": "RHSA-2019:0049", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0049" }, { "name": "RHBA-2019:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" } ], "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921" ], "discovery": "EXTERNAL" }, "title": "Out-of-Bounds write in systemd-networkd dhcpv6 option handling", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2018-10-25T00:00:00.000Z", "ID": "CVE-2018-15688", "STATE": "PUBLIC", "TITLE": "Out-of-Bounds write in systemd-networkd dhcpv6 option handling" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "systemd", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_value": "239" } ] } } ] }, "vendor_name": "systemd" } ] } }, "credit": [ { "lang": "eng", "value": "Felix Wilhelm from the Google Security Team" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "dhcp6_option_append_ia() contained an incorrect buffer size calculation." } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "USN-3807-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3807-1/" }, { "name": "USN-3806-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3806-1/" }, { "name": "RHSA-2018:3665", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3665" }, { "name": "105745", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105745" }, { "name": "https://github.com/systemd/systemd/pull/10518", "refsource": "MISC", "url": "https://github.com/systemd/systemd/pull/10518" }, { "name": "RHSA-2019:0049", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0049" }, { "name": "RHBA-2019:0327", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0327" } ] }, "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2018-15688", "datePublished": "2018-10-26T14:00:00.000Z", "dateReserved": "2018-08-22T00:00:00.000Z", "dateUpdated": "2025-06-09T15:55:41.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15686 (GCVE-0-2018-15686)
Vulnerability from cvelistv5
Published
2018-10-26 14:00
Modified
2025-06-09 15:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- fgets() can be confused by overly-long input strings. The first read will return a partial string and subsequent reads will begin as if it were a new line.
Summary
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "105747", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105747" }, { "name": "45714", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45714/" }, { "name": "USN-3816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "RHSA-2019:2091", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2091" }, { "name": "RHSA-2019:3222", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3222" }, { "name": "RHSA-2020:0593", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0593" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/systemd/systemd/pull/10519" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15686", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:50:23.789109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:50:48.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "systemd", "vendor": "systemd", "versions": [ { "lessThanOrEqual": "239", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Jann Horn" } ], "datePublic": "2018-10-25T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "fgets() can be confused by overly-long input strings. The first read will return a partial string and subsequent reads will begin as if it were a new line.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-20T22:53:12.000Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "105747", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105747" }, { "name": "45714", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45714/" }, { "name": "USN-3816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "RHSA-2019:2091", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2091" }, { "name": "RHSA-2019:3222", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3222" }, { "name": "RHSA-2020:0593", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0593" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/systemd/systemd/pull/10519" } ], "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796402" ], "discovery": "EXTERNAL" }, "title": "systemd: reexec state injection: fgets() on overlong lines leads to line splitting", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2018-10-25T00:00:00.000Z", "ID": "CVE-2018-15686", "STATE": "PUBLIC", "TITLE": "systemd: reexec state injection: fgets() on overlong lines leads to line splitting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "systemd", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_value": "239" } ] } } ] }, "vendor_name": "systemd" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "fgets() can be confused by overly-long input strings. The first read will return a partial string and subsequent reads will begin as if it were a new line." } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html" }, { "name": "105747", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105747" }, { "name": "45714", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45714/" }, { "name": "USN-3816-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "RHSA-2019:2091", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2091" }, { "name": "RHSA-2019:3222", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3222" }, { "name": "RHSA-2020:0593", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0593" }, { "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://github.com/systemd/systemd/pull/10519", "refsource": "MISC", "url": "https://github.com/systemd/systemd/pull/10519" } ] }, "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796402" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2018-15686", "datePublished": "2018-10-26T14:00:00.000Z", "dateReserved": "2018-08-22T00:00:00.000Z", "dateUpdated": "2025-06-09T15:50:48.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15687 (GCVE-0-2018-15687)
Vulnerability from cvelistv5
Published
2018-10-26 14:00
Modified
2025-06-09 15:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- There is a race condition between a stat(2) call and the fchmodat(2) call.
Summary
A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.407Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/systemd/systemd/pull/10517/commits" }, { "name": "105748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105748" }, { "name": "USN-3816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "45715", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45715/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-15687", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:48:02.637217Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:48:38.953Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "systemd", "vendor": "systemd", "versions": [ { "lessThanOrEqual": "239", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Jann Horn" } ], "datePublic": "2018-10-25T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "There is a race condition between a stat(2) call and the fchmodat(2) call.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-13T10:57:01.000Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "GLSA-201810-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/systemd/systemd/pull/10517/commits" }, { "name": "105748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105748" }, { "name": "USN-3816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "45715", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45715/" } ], "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796692" ], "discovery": "EXTERNAL" }, "title": "systemd: chown_one() can dereference symlinks", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2018-10-25T00:00:00.000Z", "ID": "CVE-2018-15687", "STATE": "PUBLIC", "TITLE": "systemd: chown_one() can dereference symlinks" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "systemd", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_value": "239" } ] } } ] }, "vendor_name": "systemd" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "There is a race condition between a stat(2) call and the fchmodat(2) call." } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-10" }, { "name": "https://github.com/systemd/systemd/pull/10517/commits", "refsource": "MISC", "url": "https://github.com/systemd/systemd/pull/10517/commits" }, { "name": "105748", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105748" }, { "name": "USN-3816-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3816-1/" }, { "name": "45715", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45715/" } ] }, "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1796692" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2018-15687", "datePublished": "2018-10-26T14:00:00.000Z", "dateReserved": "2018-08-22T00:00:00.000Z", "dateUpdated": "2025-06-09T15:48:38.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }