A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201810-10 | third party advisory vendor advisory |
https://github.com/systemd/systemd/pull/10517/commits | third party advisory patch |
http://www.securityfocus.com/bid/105748 | vdb entry third party advisory broken link |
https://usn.ubuntu.com/3816-1/ | third party advisory vendor advisory |
https://www.exploit-db.com/exploits/45715/ | exploit vdb entry third party advisory |