CVE-2022-4415
Published: 11 January 2023
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
Priority
Status
Package | Release | Status |
---|---|---|
systemd Launchpad, Ubuntu, Debian |
bionic |
Ignored
(changes too intrusive)
|
focal |
Released
(245.4-4ubuntu3.20)
|
|
jammy |
Released
(249.11-0ubuntu3.7)
|
|
kinetic |
Released
(251.4-1ubuntu7.1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(252.4-1)
|
|
xenial |
Ignored
(changes too intrusive)
|
|
Patches: upstream: (v252) https://github.com/systemd/systemd-stable/commit/9b75a3d0502d6741c8ecb7175794345f8eb3827c upstream: (v251) https://github.com/systemd/systemd-stable/commit/efca5283dc791a07171f80eef84e14fdb58fad57 upstream: (v250) https://github.com/systemd/systemd-stable/commit/1d5e0e9910500f3c3584485f77bfc35e601036e3 upstream: (v249) https://github.com/systemd/systemd-stable/commit/8215e1527d859e77dd1378fd7e42bbd32130edb3 upstream: (v248) https://github.com/systemd/systemd-stable/commit/786df410b1cb3a2294c9a5d118c958525e7439e6 upstream: (v247) https://github.com/systemd/systemd-stable/commit/bb47600aeb38c68c857fbf0ee5f66c3144dd81ce |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |