Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Findings for Container Security, High, [TheRedHatter/javagoof:Dockerfile]:Deserialization of Untrusted Data #1876

Open
armorcodegithubpreprod bot opened this issue Mar 14, 2024 · 2 comments

Comments

@armorcodegithubpreprod
Copy link

Findings for Container Security, High, [TheRedHatter/javagoof:Dockerfile]:Deserialization of Untrusted Data

Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): ><232-25+deb9u10
  • Vulnerable Path: >null

NVD Description

Note:
Versions mentioned in the description apply to the upstream systemd package.
See How to fix? for Debian:9 relevant versions.

A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.

References

Origin : null
Type : null
Image Id : null

Snyk Project Status: Active



Copy link
Author

Finding [47833068|https://preprod.armorcode.ai/#/findings/257/1167/47833068] is Mitigated
by SYSTEM via ArmorCode Platform

Copy link
Author

Finding [47833068|https://preprod.armorcode.ai/#/findings/257/1167/47833068] status changed to Confirmed
Note:
by SYSTEM via ArmorCode Platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants