{"id":"CVE-2022-45873","details":"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.","modified":"2026-02-24T01:23:52.264692Z","published":"2022-11-23T23:15:10.183Z","related":["ALSA-2023:0954"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/"},{"type":"ADVISORY","url":"https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437"},{"type":"ADVISORY","url":"https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497"},{"type":"ADVISORY","url":"https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553"},{"type":"REPORT","url":"https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497"},{"type":"REPORT","url":"https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553"},{"type":"FIX","url":"https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437"},{"type":"FIX","url":"https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497"},{"type":"FIX","url":"https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/systemd/systemd-stable","events":[{"introduced":"0"},{"last_affected":"7dbbb3933d3eff9fd6f44fb38c39b9b452933128"},{"introduced":"a420d71793bcbc1539a63be60f83cdc14373ea4a"},{"last_affected":"b622e95f2f59fcb58e23ddafed745eee26a0f52f"}]}],"versions":["v250","v251","v251-rc1","v251-rc2","v251-rc3","v252-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-45873.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}