A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201810-10 | vendor advisory third party advisory |
https://github.com/systemd/systemd/pull/10517/commits | patch third party advisory |
http://www.securityfocus.com/bid/105748 | third party advisory vdb entry broken link |
https://usn.ubuntu.com/3816-1/ | vendor advisory third party advisory |
https://www.exploit-db.com/exploits/45715/ | third party advisory exploit vdb entry |