Description
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13464 | It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled. |
Ubuntu USN |
USN-4269-1 | systemd vulnerabilities |
References
History
Mon, 09 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-09T15:49:20.110Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3844
Updated: 2024-08-04T19:19:18.587Z
Status : Modified
Published: 2019-04-26T21:29:00.423
Modified: 2024-11-21T04:42:41.240
Link: CVE-2019-3844
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN