CVE-2018-15686
Published: 26 October 2018
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
Priority
Status
Package | Release | Status |
---|---|---|
systemd
Launchpad, Ubuntu, Debian |
bionic |
Released
(237-3ubuntu10.6)
|
cosmic |
Released
(239-7ubuntu10.3)
|
|
trusty |
Not vulnerable
(binary not built)
|
|
upstream |
Pending
|
|
xenial |
Released
(229-4ubuntu21.8)
|
|
Patches:
upstream: https://github.com/systemd/systemd/pull/10519 upstream: https://github.com/systemd/systemd/commit/9f1c81d80a435d15ca1bd536a6d043c18c81c047 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |