CVE-2022-45873

Source
https://cve.org/CVERecord?id=CVE-2022-45873
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45873.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-45873
Downstream
Related
Published
2022-11-23T23:15:10.183Z
Modified
2026-02-17T07:40:09.911866Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parseelfobject in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

References

Affected packages

Git / github.com/systemd/systemd

Affected ranges

Type
GIT
Repo
https://github.com/systemd/systemd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
Last affected

Affected versions

Other
v250
v251
v251-rc1
v251-rc2
v251-rc3
v252-rc1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45873.json"