A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105747 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:2091 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3222 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0593 - Third Party Advisory | |
References | () https://github.com/systemd/systemd/pull/10519 - Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201810-10 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3816-1/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45714/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory |
31 Jan 2022, 18:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:* |
28 Jul 2021, 16:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MLIST) https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2091 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0593 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3222 - Third Party Advisory | |
CPE | cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
Information
Published : 2018-10-26 14:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15686
Mitre link : CVE-2018-15686
CVE.ORG link : CVE-2018-15686
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- communications_cloud_native_core_network_function_cloud_native_environment
debian
- debian_linux
systemd_project
- systemd
CWE
CWE-502
Deserialization of Untrusted Data