Note:
This project will be discontinued after December 13, 2021. [more]
2019-04-26
It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.
Products | Ubuntu_linux, Fedora, Cn1610_firmware, Hci_management_node, Snapprotect, Solidfire, Systemd |
Type | Improper Privilege Management (CWE-269) |
First patch | - None (likely due to unavailable code) |
Links |
• https://security.netapp.com/advisory/ntap-20190619-0002/
• https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843 • https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/ • https://usn.ubuntu.com/4269-1/ |