Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in systemd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in systemd
ID: RHSA-2024:1105
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux BaseOS EUS (v.8.6)
Datum: Mi, 6. März 2024, 18:03
Referenzen: https://access.redhat.com/security/cve/CVE-2022-4415
https://access.redhat.com/security/cve/CVE-2022-3821
https://bugzilla.redhat.com/show_bug.cgi?id=2175611
https://bugzilla.redhat.com/show_bug.cgi?id=2155515
https://access.redhat.com/errata/RHSA-2024:1105
https://bugzilla.redhat.com/show_bug.cgi?id=2139327
https://access.redhat.com/security/cve/CVE-2023-26604
Applikationen: systemd

Originalnachricht

An update for systemd is now available for Red Hat Enterprise Linux 8.6
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The systemd packages contain systemd, a system and service manager for Linux,
compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: buffer overrun in format_timespan() function (CVE-2022-3821)

* systemd: local information leak due to systemd-coredump not respecting
fs.suid_dumpable kernel setting (CVE-2022-4415)

* systemd: privilege escalation via the less pager (CVE-2023-26604)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2022-3821: Off-by-one Error (CWE-193)
CVE-2022-4415: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2023-26604
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung