A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:ceph_storage",
"extracted_events": [
{
"last_affected": "4.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:migration_toolkit:1.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:migration_toolkit",
"extracted_events": [
{
"last_affected": "1.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:openshift_container_platform",
"extracted_events": [
{
"last_affected": "4.0"
}
]
}
]
}