ALT-PU-2018-1552-1
Closed vulnerabilities
BDU:2017-01575
Уязвимость функции dns_packet_new системного сервиса system-resolved менеджера Systemmd операционной системы Linux, позволяющая нарушителю выполнить произвольный код
BDU:2017-02107
Уязвимость службы анализирования имен пользователей демона Systemd, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю запустить службу с root-привилегиями
BDU:2019-01640
Уязвимость демона Systemd, связанная с одновременным использованием общего ресурса и ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04524
Уязвимость программы systemd-tmpfiles демона Systemd, позволяющая нарушителю обойти существующие ограничения доступа и раскрыть защищаемую информацию
Modified: 2025-04-20
CVE-2017-1000082
systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
- http://www.openwall.com/lists/oss-security/2017/07/02/1
- http://www.securityfocus.com/bid/99507
- http://www.securitytracker.com/id/1038839
- https://github.com/systemd/systemd/issues/6237
- http://www.openwall.com/lists/oss-security/2017/07/02/1
- http://www.securityfocus.com/bid/99507
- http://www.securitytracker.com/id/1038839
- https://github.com/systemd/systemd/issues/6237
Modified: 2025-04-20
CVE-2017-15908
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
- http://www.securityfocus.com/bid/101600
- http://www.securitytracker.com/id/1039662
- https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351
- https://github.com/systemd/systemd/pull/7184
- https://usn.ubuntu.com/3558-1/
- http://www.securityfocus.com/bid/101600
- http://www.securitytracker.com/id/1039662
- https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351
- https://github.com/systemd/systemd/pull/7184
- https://usn.ubuntu.com/3558-1/
Modified: 2024-11-21
CVE-2017-18078
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
- http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
- http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
- http://www.openwall.com/lists/oss-security/2018/01/29/3
- https://github.com/systemd/systemd/issues/7736
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://www.exploit-db.com/exploits/43935/
- https://www.openwall.com/lists/oss-security/2018/01/29/4
- http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
- http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
- http://www.openwall.com/lists/oss-security/2018/01/29/3
- https://github.com/systemd/systemd/issues/7736
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- https://www.exploit-db.com/exploits/43935/
- https://www.openwall.com/lists/oss-security/2018/01/29/4
Modified: 2025-04-20
CVE-2017-9217
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
- http://www.securityfocus.com/bid/98677
- https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be
- https://github.com/systemd/systemd/pull/5998
- https://launchpad.net/bugs/1621396
- http://www.securityfocus.com/bid/98677
- https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be
- https://github.com/systemd/systemd/pull/5998
- https://launchpad.net/bugs/1621396
- https://security.netapp.com/advisory/ntap-20241213-0003/
Modified: 2025-04-20
CVE-2017-9445
In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
- http://openwall.com/lists/oss-security/2017/06/27/8
- http://www.securityfocus.com/bid/99302
- http://www.securitytracker.com/id/1038806
- https://launchpad.net/bugs/1695546
- http://openwall.com/lists/oss-security/2017/06/27/8
- http://www.securityfocus.com/bid/99302
- http://www.securitytracker.com/id/1038806
- https://launchpad.net/bugs/1695546
Modified: 2024-11-21
CVE-2018-1049
In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.
- http://www.securitytracker.com/id/1041520
- https://access.redhat.com/errata/RHSA-2018:0260
- https://bugzilla.redhat.com/show_bug.cgi?id=1534701
- https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
- https://usn.ubuntu.com/3558-1/
- http://www.securitytracker.com/id/1041520
- https://access.redhat.com/errata/RHSA-2018:0260
- https://bugzilla.redhat.com/show_bug.cgi?id=1534701
- https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
- https://usn.ubuntu.com/3558-1/
Modified: 2024-11-21
CVE-2018-16888
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
- https://access.redhat.com/errata/RHSA-2019:2091
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
- https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74%40%3Cuser.cassandra.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190307-0007/
- https://usn.ubuntu.com/4269-1/
- https://access.redhat.com/errata/RHSA-2019:2091
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
- https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74%40%3Cuser.cassandra.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190307-0007/
- https://usn.ubuntu.com/4269-1/
Closed bugs
systemd-sysv-install ROOT overquoting
having upgraded from 230 or 231 to 234, NFS is not unmounted when halting
create static device inodes for SysV init
Wrong order in PATH env variable