A systemd security update has been released for Debian GNU/Linux 9 LTS to address a heap use-after-free vulnerability.
DLA 3063-1: systemd security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3063-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sylvain Beucler
June 30, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : systemd
Version : 232-25+deb9u14
CVE ID : CVE-2020-1712
Debian Bug : 950732
A heap use-after-free vulnerability was found in systemd, a system and
service manager, where asynchronous Polkit queries are performed while
handling dbus messages. A local unprivileged attacker can abuse this
flaw to crash systemd services or potentially execute code and elevate
their privileges, by sending specially crafted dbus messages.
For Debian 9 stretch, this problem has been fixed in version
232-25+deb9u14.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/systemd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS