Lucene search

K
mageiaGentoo FoundationMGASA-2022-0429
HistoryNov 17, 2022 - 11:45 p.m.

Updated systemd packages fix security vulnerability

2022-11-1723:45:15
Gentoo Foundation
advisories.mageia.org
17
systemd
packages
security vulnerability
buffer overrun
format_timespan
bsc#1204968
cve-2022-3821
pstore
modules
core
mount
logind
udev naming scheme
sle15-sp3
backward compatibility
unix

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%

buffer overrun in format_timespan() function (bsc#1204968) (CVE-2022-3821) Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428 0469b9f2bc pstore: do not try to load all known pstore modules ad05f54439 pstore: Run after modules are loaded ccad817445 core: Add trigger limit for path units 281d818fe3 core/mount: also add default before dependency for automount mount units ffe5b4afa8 logind: fix crash in logind on user-specified message string Document udev naming scheme (bsc#1204179) Make “sle15-sp3” net naming scheme still available for backward compatibility reason

OSVersionArchitecturePackageVersionFilename
Mageia8noarchsystemd< 246.16-3systemd-246.16-3.mga8

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%