Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
7.8HIGH
EPSS
1.5%
top 18.67%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 26
Latest updateMay 13

Description

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Debiansystemd< 239-12+3
Ubuntusystemd< 229-4ubuntu21.9+3
CVEListV5systemd/systemdunspecified239

Also affects: Debian Linux 8.0, Ubuntu Linux 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

6
GHSA
GHSA-86rx-vp92-xvgg: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess2022-05-13
OSV
systemd regression2018-11-27
OSV
systemd vulnerability2018-11-19
OSV
systemd vulnerabilities2018-11-12
CVEList
systemd: reexec state injection: fgets() on overlong lines leads to line splitting2018-10-26

💥Exploits & PoCs

1
Exploit-DB
systemd - 'reexec' State Injection2018-10-29

📋Vendor Advisories

5
Oracle
Oracle Oracle Communications Risk Matrix: Signaling (Calico) — CVE-2018-156862021-07-15
Ubuntu
systemd vulnerabilities2018-11-12
Red Hat
systemd: line splitting via fgets() allows for state injection during daemon-reexec2018-10-26
Microsoft
systemd: reexec state injection: fgets() on overlong lines leads to line splitting2018-10-09
Debian
CVE-2018-15686: systemd - A vulnerability in unit_deserialize of systemd allows an attacker to supply arbi...2018

💬Community

2
Bugzilla
CVE-2018-15686 systemd: Line splitting via fgets() allows for state injection during daemon-reexec [fedora-all]2018-10-26
Bugzilla
CVE-2018-15686 systemd: line splitting via fgets() allows for state injection during daemon-reexec2018-10-15
CVE-2018-15686 (HIGH CVSS 7.8) | A vulnerability in unit_deserialize | cvebase.io