Executive Summary

Summary
Title systemd regression
Informations
Name USN-3816-3 First vendor Publication 2018-11-27
Vendor Ubuntu Last vendor Modification 2018-11-27
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

USN-3816-1 caused a regression in systemd-tmpfiles.

Software Description: - systemd: system and service manager

Details:

USN-3816-1 fixed vulnerabilities in systemd. The fix for CVE-2018-6954 caused a regression in systemd-tmpfiles when running Ubuntu inside a container on some older kernels. This issue only affected Ubuntu 16.04 LTS. In order to continue to support this configuration, the fixes for CVE-2018-6954 have been reverted.

We apologize for the inconvenience.

Original advisory details:

テつ Jann Horn discovered that unit_deserialize incorrectly handled status messages テつ above a certain length. A local attacker could potentially exploit this via テつ NotifyAccess to inject arbitrary state across re-execution and obtain root テつ privileges. (CVE-2018-15686) テつ テつ Jann Horn discovered a race condition in chown_one(). A local attacker テつ could potentially exploit this by setting arbitrary permissions on certain テつ files to obtain root privileges. This issue only affected Ubuntu 18.04 LTS テつ and Ubuntu 18.10. (CVE-2018-15687) テつ テつ It was discovered that systemd-tmpfiles mishandled symlinks in テつ non-terminal path components. A local attacker could potentially exploit テつ this by gaining ownership of certain files to obtain root privileges. This テつ issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-6954)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: テつ systemdテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 229-4ubuntu21.10

After a standard system update you need to reboot your computer to make all the necessary changes.

References: テつ https://usn.ubuntu.com/usn/usn-3816-3 テつ https://usn.ubuntu.com/usn/usn-3816-1 テつ https://launchpad.net/bugs/1804847

Package Information: テつ https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.10

Original Source

Url : http://www.ubuntu.com/usn/USN-3816-3

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-502 Deserialization of Untrusted Data
33 % CWE-362 Race Condition
33 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 55
Os 4
Os 1
Os 1

Nessusツョ Vulnerability Scanner

Date Description
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-24bd6c9d4a.nasl - Type : ACT_GATHER_INFO
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-c402eea18b.nasl - Type : ACT_GATHER_INFO
2018-11-20 Name : The remote Debian host is missing a security update.
File : debian_DLA-1580.nasl - Type : ACT_GATHER_INFO
2018-10-31 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201810-10.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2018-12-10 21:21:42
  • Multiple Updates
2018-11-27 21:20:08
  • First insertion