Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2022-45873: systemd (RLSA-2023-0954)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Rocky Linux: CVE-2022-45873: systemd (RLSA-2023-0954)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/23/2022
Created
03/13/2024
Added
03/12/2024
Modified
03/12/2024

Description

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

Solution(s)

  • rocky-upgrade-systemd
  • rocky-upgrade-systemd-container
  • rocky-upgrade-systemd-container-debuginfo
  • rocky-upgrade-systemd-debuginfo
  • rocky-upgrade-systemd-debugsource
  • rocky-upgrade-systemd-devel
  • rocky-upgrade-systemd-devel-debuginfo
  • rocky-upgrade-systemd-journal-remote
  • rocky-upgrade-systemd-journal-remote-debuginfo
  • rocky-upgrade-systemd-libs
  • rocky-upgrade-systemd-libs-debuginfo
  • rocky-upgrade-systemd-oomd
  • rocky-upgrade-systemd-oomd-debuginfo
  • rocky-upgrade-systemd-pam
  • rocky-upgrade-systemd-pam-debuginfo
  • rocky-upgrade-systemd-resolved
  • rocky-upgrade-systemd-resolved-debuginfo
  • rocky-upgrade-systemd-rpm-macros
  • rocky-upgrade-systemd-udev
  • rocky-upgrade-systemd-udev-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;