ALT-PU-2019-2645-1
Closed vulnerabilities
Published: 2020-01-21
BDU:2020-05729
Уязвимость подсистемы инициализации и управления службами в Linux systemd, связанная с неосвобождением ресурса после истечения действительного срока его эксплуатации, позволяющая нарушителю вызвать отказ в обслуживаниии
Severity: LOW (2.4)
Vector: AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Severity: LOW (2.1)
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
References:
Published: 2019-05-17
Modified: 2025-05-05
Modified: 2025-05-05
CVE-2018-20839
systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: MEDIUM (4.3)
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
References:
- http://www.securityfocus.com/bid/108389
- https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993
- https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f
- https://github.com/systemd/systemd/pull/12378
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190530-0002/
- http://www.securityfocus.com/bid/108389
- https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1803993
- https://github.com/systemd/systemd/commit/9725f1a10f80f5e0ae7d9b60547458622aeb322f
- https://github.com/systemd/systemd/pull/12378
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190530-0002/
Published: 2020-01-21
Modified: 2025-06-09
Modified: 2025-06-09
CVE-2019-20386
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
Severity: LOW (2.1)
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Severity: LOW (2.4)
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References:
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
- https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
- https://security.netapp.com/advisory/ntap-20200210-0002/
- https://usn.ubuntu.com/4269-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
- https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
- https://security.netapp.com/advisory/ntap-20200210-0002/
- https://usn.ubuntu.com/4269-1/