CVE-2020-1712

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:migration_toolkit:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54 - Patch, Third Party Advisory () https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54 - Patch, Third Party Advisory
References () https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb - Patch, Third Party Advisory () https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb - Patch, Third Party Advisory
References () https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d - Patch, Third Party Advisory () https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d - Patch, Third Party Advisory
References () https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2 - Patch, Third Party Advisory () https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html - Mailing List, Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2020/02/05/1 - Mailing List, Patch, Third Party Advisory () https://www.openwall.com/lists/oss-security/2020/02/05/1 - Mailing List, Patch, Third Party Advisory

29 Nov 2022, 16:25

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

30 Jun 2022, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html -

28 Jan 2022, 21:24

Type Values Removed Values Added
CPE cpe:2.3:a:freedesktop:systemd:*:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Information

Published : 2020-03-31 17:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1712

Mitre link : CVE-2020-1712

CVE.ORG link : CVE-2020-1712


JSON object : View

Products Affected

systemd_project

  • systemd

redhat

  • enterprise_linux
  • ceph_storage
  • openshift_container_platform
  • migration_toolkit
  • discovery

debian

  • debian_linux
CWE
CWE-416

Use After Free