[USN-3855-1] systemd vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”sibTtU3ta6mY9LTRbe1yZbzu6lUHUbpCa”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–sibTtU3ta6mY9LTRbe1yZbzu6lUHUbpCa

protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3855-1] systemd vulnerabilities

–m5onwqW5QHaQVgm45gvlK7qSfX05XyHxy

Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=
=

Ubuntu Security Notice USN-3855-1
January 11, 2019

systemd vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in systemd.

Software Description:
– systemd: system and service manager

Details:

It was discovered that systemd-journald allocated variable-length buffers=

for certain message fields on the stack. A local attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2018-16864)

It was discovered that systemd-journald allocated variable-length arrays
of objects representing message fields on the stack. A local attacker
could potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2018-16865)

An out-of-bounds read was discovered in systemd-journald. A local
attacker could potentially exploit this to obtain sensitive information
and bypass ASLR protections. (CVE-2018-16866)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
=C2=A0 systemd=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 239-7ubuntu10.6

Ubuntu 18.04 LTS:
=C2=A0 systemd=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 237-3ubuntu10.11

Ubuntu 16.04 LTS:
=C2=A0 systemd=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 229-4ubuntu21.15

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3855-1
=C2=A0 CVE-2018-16864, CVE-2018-16865, CVE-2018-16866

Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/systemd/239-7ubuntu10.6
=C2=A0 https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.11
=C2=A0 https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.15

–m5onwqW5QHaQVgm45gvlK7qSfX05XyHxy–

–sibTtU3ta6mY9LTRbe1yZbzu6lUHUbpCa

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlw4p/AACgkQYR+97NWU
bg8jGwf+MHGb6GfgGu15xS3cIOjSyCVPxI0MyA936/LPCoDVG4PWkGUPihjgloni
TYH/BEifI0sciEdUduzvTPGjVYvZMzveBbO/pHsvNfI6LCnNuiraI81lMNiQGEOe
imNP2gbAgnGHnItot69GokDhIors6Fsr5CD2/Ij5AkhsF7crUwxWX0rMb99HEFWD
f5A8XvDIkMdP62mP1P50w4Evyirwj8ww0Fahm8g6CZXPA1pgNhPoTLL2/lFJabvW
D3f+pkTkaEz36wPK4+LBCYWuesuXOnuRMYUjuwLoRYKWNC0sTtjw2u2yPOR5AKdI
YBAD56M11+TeigdXtenFtQz2CAGPYg==
=bJkU
—–END PGP SIGNATURE—–

–sibTtU3ta6mY9LTRbe1yZbzu6lUHUbpCa–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK