Systemd Project

Systemd

55 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 29.01.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:18

systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving...

  • EPSS 0.27%
  • Veröffentlicht 26.10.2017 14:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected ser...

Exploit
  • EPSS 0.59%
  • Veröffentlicht 25.09.2017 21:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Stack-based buffer overflow in the getpwnam and getgrnam functions of the NSS module nss-mymachines in systemd.

  • EPSS 0.26%
  • Veröffentlicht 07.07.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

  • EPSS 1.33%
  • Veröffentlicht 28.06.2017 06:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolv...

  • EPSS 0.91%
  • Veröffentlicht 24.05.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.

  • EPSS 0.71%
  • Veröffentlicht 23.01.2017 07:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 13.10.2016 14:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 13.10.2016 14:59:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.

  • EPSS 0.12%
  • Veröffentlicht 18.04.2014 14:55:25
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.