VYPR

rpm package

suse/systemd&distro=SUSE Linux Enterprise Software Development Kit 12 SP2

pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2

Vulnerabilities (6)

  • CVE-2018-1049Feb 16, 2018
    affected < 228-150.29.1fixed 228-150.29.1

    In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like thi

  • CVE-2017-18078Jan 29, 2018
    affected < 228-150.32.1fixed 228-150.32.1

    systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for whi

  • CVE-2017-15908HigOct 26, 2017
    affected < 228-150.29.1fixed 228-150.29.1

    In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.

  • CVE-2017-9445HigJun 28, 2017
    affected < 228-150.7.1fixed 228-150.7.1

    In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer th

  • CVE-2017-9217HigMay 24, 2017
    affected < 228-149.3fixed 228-149.3

    systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.

  • CVE-2016-10156HigJan 23, 2017
    affected < 228-132.1fixed 228-132.1

    A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.