vulnerability
Oracle Linux: CVE-2020-13776: ELSA-2021-1611: systemd security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:H/Au:S/C:C/I:C/A:C) | 2020-05-31 | 2021-05-26 | 2024-11-22 |
Severity
6
CVSS
(AV:L/AC:H/Au:S/C:C/I:C/A:C)
Published
2020-05-31
Added
2021-05-26
Modified
2024-11-22
Description
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or "0x" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.
A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or "0x" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.
Solution(s)
oracle-linux-upgrade-systemdoracle-linux-upgrade-systemd-containeroracle-linux-upgrade-systemd-develoracle-linux-upgrade-systemd-journal-remoteoracle-linux-upgrade-systemd-libsoracle-linux-upgrade-systemd-pamoracle-linux-upgrade-systemd-testsoracle-linux-upgrade-systemd-udev

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.