First published: Thu Jan 23 2020(Updated: )
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <245 | 245 |
Systemd Project Systemd | <=244 | |
Redhat Ceph Storage | =4.0 | |
Redhat Discovery | ||
Redhat Migration Toolkit | =1.0 | |
Redhat Openshift Container Platform | =4.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/systemd | 247.3-7+deb11u5 247.3-7+deb11u6 252.30-1~deb12u2 256.6-1 256.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1712 is a heap use-after-free vulnerability found in systemd before version v245-rc1.
CVE-2020-1712 allows a local unprivileged attacker to crash systemd services or potentially execute code and elevate their privileges.
CVE-2020-1712 affects systemd versions 241-7~deb10u8, 241-7~deb10u10, 247.3-7+deb11u4, 252.17-1~deb12u1, and 254.5-1 on Debian, and versions 244.1-0ubuntu3 on Ubuntu.
To fix CVE-2020-1712, update the affected systemd package to version 241-7~deb10u10 or install the latest version available for your Linux distribution.
You can find more information about CVE-2020-1712 in the following references: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712), [GitHub Commit 1](https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54), [GitHub Commit 2](https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb).