It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.
2019-04-26T21:29:00.360
2024-11-21T04:42:41.073
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | systemd_project | systemd | < 242 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 19.10 | Yes |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | snapprotect | - | Yes |
Application | netapp | solidfire | - | Yes |
Operating System | netapp | cn1610_firmware | - | Yes |
Hardware | netapp | cn1610 | - | No |