DEBIAN-CVE-2016-10156

Source
https://security-tracker.debian.org/tracker/CVE-2016-10156
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2016-10156.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2016-10156
Upstream
Published
2017-01-23T07:59:00Z
Modified
2025-09-19T06:13:26Z
Summary
[none]
Details

A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.

References

Affected packages

Debian:11 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
229-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
229-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
229-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / systemd

Package

Name
systemd
Purl
pkg:deb/debian/systemd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
229-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}