CVE-2017-18078
- EPSS 0.08%
- Veröffentlicht 29.01.2018 05:29:00
- Zuletzt bearbeitet 21.11.2024 03:19:18
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving...
CVE-2017-15908
- EPSS 0.27%
- Veröffentlicht 26.10.2017 14:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected ser...
CVE-2015-7510
- EPSS 0.59%
- Veröffentlicht 25.09.2017 21:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Stack-based buffer overflow in the getpwnam and getgrnam functions of the NSS module nss-mymachines in systemd.
- EPSS 0.26%
- Veröffentlicht 07.07.2017 17:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
CVE-2017-9445
- EPSS 1.33%
- Veröffentlicht 28.06.2017 06:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolv...
CVE-2017-9217
- EPSS 0.91%
- Veröffentlicht 24.05.2017 05:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
CVE-2016-10156
- EPSS 0.71%
- Veröffentlicht 23.01.2017 07:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
CVE-2016-7796
- EPSS 0.39%
- Veröffentlicht 13.10.2016 14:59:14
- Zuletzt bearbeitet 06.05.2026 22:30:45
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled...
CVE-2016-7795
- EPSS 0.16%
- Veröffentlicht 13.10.2016 14:59:13
- Zuletzt bearbeitet 06.05.2026 22:30:45
The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
CVE-2012-0871
- EPSS 0.12%
- Veröffentlicht 18.04.2014 14:55:25
- Zuletzt bearbeitet 06.05.2026 22:30:45
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.