Lucene search

K
redhatRedHatRHSA-2024:1105
HistoryMar 05, 2024 - 10:44 a.m.

(RHSA-2024:1105) Moderate: systemd security update

2024-03-0510:44:55
access.redhat.com
14
systemd
security update
buffer overrun
local information leak
privilege escalation
cve-2022-3821
cve-2022-4415
cve-2023-26604
linux
cgroups
service manager
sysvinit.

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.8%

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd: buffer overrun in format_timespan() function (CVE-2022-3821)

  • systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)

  • systemd: privilege escalation via the less pager (CVE-2023-26604)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.