[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-025 --- systemd

ID: oval:org.secpod.oval:def:19500055Date: (C)2023-06-12   (M)2023-08-02
Class: PATCHFamily: unix




A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp. A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting. systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file

Platform:
Amazon Linux 2023
Product:
systemd
Reference:
ALAS2023-2023-025
CVE-2021-3997
CVE-2022-4415
CVE-2022-45873
CVE    3
CVE-2022-4415
CVE-2021-3997
CVE-2022-45873
CPE    1
cpe:/a:ubuntu_developers:systemd

© SecPod Technologies