Name | CVE-2022-4415 |
Description | A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1026831 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
systemd (PTS) | bullseye | 247.3-7+deb11u5 | fixed |
| bullseye (security) | 247.3-7+deb11u6 | fixed |
| bookworm | 252.31-1~deb12u1 | fixed |
| sid, trixie | 257-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
systemd | source | bullseye | 247.3-7+deb11u2 | | | |
systemd | source | (unstable) | 252.4-1 | | | 1026831 |
Notes
[buster] - systemd <ignored> (Optional feature; disabled by default)
Preparation (main branch commit only): https://github.com/systemd/systemd/commit/510a146634f3e095b34e2a26023b1b1f99dcb8c0
Fixed by: https://github.com/systemd/systemd/commit/3e4d0f6cf99f8677edd6a237382a65bfe758de03
Fixed by: https://github.com/systemd/systemd-stable/commit/bb47600aeb38c68c857fbf0ee5f66c3144dd81ce (v247.13)
Affects only v246 and newer (when acl support was enabled by default), and only if building with libacl support
Optional (disabled by default) faulty behaviour introduced by v215
https://www.openwall.com/lists/oss-security/2022/12/21/3