SB2019051303 - Privilege escalation in systemd
Published: May 13, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-3843)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to an error in the process of binary creation, when the DynamicUser property is used to create a SUID or SGID binary for a systemd service. A local user can abuse the systemd functionality to execute arbitrary code on the target system with elevated privileges.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-3844)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local user may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/bid/108116
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
- http://www.securityfocus.com/bid/108096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844