ALT-PU-2024-6694-1
Package systemd updated to version 254.10-alt1.E2K.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-07591
Уязвимость службы systemd-coredump демона Systemd, позволяющая нарушителю нарушителю оказать воздействие на конфиденциальность защищаемой информации
Modified: 2024-11-21
CVE-2022-3821
An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/pull/23933
- https://github.com/systemd/systemd/pull/23933
- [debian-lts-announce] 20230629 [SECURITY] [DLA 3474-1] systemd security update
- [debian-lts-announce] 20230629 [SECURITY] [DLA 3474-1] systemd security update
- FEDORA-2022-8ac4104a02
- FEDORA-2022-8ac4104a02
- GLSA-202305-15
- GLSA-202305-15
Modified: 2024-11-21
CVE-2022-4415
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://security.netapp.com/advisory/ntap-20230216-0010/
- https://www.openwall.com/lists/oss-security/2022/12/21/3
- https://www.openwall.com/lists/oss-security/2022/12/21/3
Modified: 2024-11-21
CVE-2022-45873
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- FEDORA-2022-ef4f57b072
- FEDORA-2022-ef4f57b072
Modified: 2024-11-21
CVE-2023-31439
An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."
- https://github.com/kastel-security/Journald
- https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
- https://github.com/systemd/systemd/pull/28885
- https://github.com/systemd/systemd/releases
- https://github.com/kastel-security/Journald
- https://github.com/systemd/systemd/releases
- https://github.com/systemd/systemd/pull/28885
- https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
Closed bugs
Есть правило для неизвестной группы sgx
control libnss-role status не работает
Increase vm.max_map_count