vulnerability
Oracle Linux: CVE-2018-15686: ELSA-2019-2091: systemd security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:H/Au:S/C:N/I:P/A:P) | Oct 26, 2018 | Jul 21, 2020 | Jan 7, 2025 |
Severity
2
CVSS
(AV:L/AC:H/Au:S/C:N/I:P/A:P)
Published
Oct 26, 2018
Added
Jul 21, 2020
Modified
Jan 7, 2025
Description
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.
It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.
Solutions
oracle-linux-upgrade-libgudev1oracle-linux-upgrade-libgudev1-develoracle-linux-upgrade-systemdoracle-linux-upgrade-systemd-develoracle-linux-upgrade-systemd-journal-gatewayoracle-linux-upgrade-systemd-libsoracle-linux-upgrade-systemd-networkdoracle-linux-upgrade-systemd-pythonoracle-linux-upgrade-systemd-resolvedoracle-linux-upgrade-systemd-sysv
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.