Link Following Affecting systemd-python package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-SYSTEMDPYTHON-1381482
- published 26 Jul 2021
- disclosed 25 Jan 2018
Introduced: 25 Jan 2018
CVE-2018-6954 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7 systemd-python.
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-python package and not the systemd-python package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
References
- https://access.redhat.com/security/cve/CVE-2018-6954
- https://github.com/systemd/systemd/issues/7986
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://usn.ubuntu.com/3816-1/
- https://usn.ubuntu.com/3816-2/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E