First published: Fri Mar 01 2019(Updated: )
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | <242 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Netapp Hci Management Node | ||
Netapp Snapprotect | ||
Netapp Solidfire | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
redhat/systemd | <242 | 242 |
All of | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
debian/systemd | 247.3-7+deb11u5 247.3-7+deb11u6 252.31-1~deb12u1 257-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-3844.
The severity of CVE-2019-3844 is high with a severity value of 7.8.
The following software and versions are affected by CVE-2019-3844: Systemd Project Systemd (up to version 242), Canonical Ubuntu Linux 16.04 LTS, Canonical Ubuntu Linux 18.04 LTS, Canonical Ubuntu Linux 19.10, Netapp HCI Management Node, Netapp Snapprotect, Netapp Solidfire, and Netapp Cn1610 Firmware.
A local attacker can exploit CVE-2019-3844 by using a systemd service with DynamicUser property to execute SUID binaries and create binaries owned by the service transient group with the setgid bit set, which can grant new privileges and access resources.
Yes, there are known remedies or fixes for CVE-2019-3844. For example, the Ubuntu package `systemd` can be fixed by applying version 237-3ubuntu10.38.