Linux systemd Affected by Memory Corruption Vulnerabilities, No Patches Yet

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Security researchers have disclosed three vulnerabilities that affect a system service part of 'systemd,' a core component in Linux that manages system processes after the boot process.
The bugs exist in 'journald' service, tasked with collecting and storing log data, and they can be exploited to obtain root privileges on the target machine or to leak information. No patches exist at the moment.
Exploit does not require user interaction

"To the best of our knowledge, all systemd-based Linux distributions are vulnerable, but SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29 are not exploitable because their user space is compiled with GCC's -fstack-clash-protection," the advisory reads.
All three bugs can be leveraged with no user interaction. One memory corruption is locally exploitable, while the other can be capitalized over the network.
The two memory corruption flaws are exploitable since systemd v201 and v230.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top