Debian 10224 Published by

A systemd security update has been released for Debian GNU/Linux 9 LTS to address a heap use-after-free vulnerability.



DLA 3063-1: systemd security update



- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3063-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Sylvain Beucler
June 30, 2022   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : systemd
Version : 232-25+deb9u14
CVE ID : CVE-2020-1712
Debian Bug : 950732

A heap use-after-free vulnerability was found in systemd, a system and
service manager, where asynchronous Polkit queries are performed while
handling dbus messages. A local unprivileged attacker can abuse this
flaw to crash systemd services or potentially execute code and elevate
their privileges, by sending specially crafted dbus messages.

For Debian 9 stretch, this problem has been fixed in version
232-25+deb9u14.

We recommend that you upgrade your systemd packages.

For the detailed security status of systemd please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/systemd

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS