Zbigniew Jędrzejewski-Szmek

5 exploits Active since Jul 2021
CVE-2021-33910 WRITEUP MEDIUM WRITEUP
Systemd < 246.15 - Resource Allocation Without Limits
basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
CVSS 5.5
CVE-2021-33910 WRITEUP MEDIUM WRITEUP
Systemd < 246.15 - Resource Allocation Without Limits
basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
CVSS 5.5
CVE-2021-3997 WRITEUP MEDIUM WRITEUP
Systemd < 250.2 - Denial of Service
A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.
CVSS 5.5
CVE-2022-4415 WRITEUP MEDIUM WRITEUP
Systemd < 253 - Information Disclosure
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
CVSS 5.5
CVE-2022-45873 WRITEUP MEDIUM WRITEUP
Systemd < 251 - Denial of Service
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
CVSS 5.5