Unrated severityNVD Advisory· Published Jan 29, 2018· Updated Aug 5, 2024
CVE-2017-18078
CVE-2017-18078
Description
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Affected products
16- osv-coords16 versionspkg:apk/chainguard/py3.10-systemdpkg:apk/chainguard/py3.11-systemdpkg:apk/chainguard/py3.12-systemdpkg:apk/chainguard/py3.13-systemdpkg:apk/chainguard/py3-supported-systemdpkg:apk/chainguard/py3-systemdpkg:rpm/opensuse/systemd&distro=openSUSE%20Tumbleweedpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
< 0+ 15 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 249.4-2.2
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
- (no CPE)range: < 228-150.32.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.exploit-db.com/exploits/43935/mitreexploitx_refsource_EXPLOIT-DB
- lists.opensuse.org/opensuse-updates/2018-02/msg00109.htmlmitrevendor-advisoryx_refsource_SUSE
- packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.htmlmitrex_refsource_MISC
- www.openwall.com/lists/oss-security/2018/01/29/3mitremailing-listx_refsource_MLIST
- github.com/systemd/systemd/issues/7736mitrex_refsource_MISC
- lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/04/msg00022.htmlmitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2018/01/29/4mitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.