Executive Summary

Summary
Title systemd regression
Informations
NameUSN-3816-3First vendor Publication2018-11-27
VendorUbuntuLast vendor Modification2018-11-27
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

USN-3816-1 caused a regression in systemd-tmpfiles.

Software Description: - systemd: system and service manager

Details:

USN-3816-1 fixed vulnerabilities in systemd. The fix for CVE-2018-6954 caused a regression in systemd-tmpfiles when running Ubuntu inside a container on some older kernels. This issue only affected Ubuntu 16.04 LTS. In order to continue to support this configuration, the fixes for CVE-2018-6954 have been reverted.

We apologize for the inconvenience.

Original advisory details:

テつ Jann Horn discovered that unit_deserialize incorrectly handled status messages テつ above a certain length. A local attacker could potentially exploit this via テつ NotifyAccess to inject arbitrary state across re-execution and obtain root テつ privileges. (CVE-2018-15686) テつ テつ Jann Horn discovered a race condition in chown_one(). A local attacker テつ could potentially exploit this by setting arbitrary permissions on certain テつ files to obtain root privileges. This issue only affected Ubuntu 18.04 LTS テつ and Ubuntu 18.10. (CVE-2018-15687) テつ テつ It was discovered that systemd-tmpfiles mishandled symlinks in テつ non-terminal path components. A local attacker could potentially exploit テつ this by gaining ownership of certain files to obtain root privileges. This テつ issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-6954)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: テつ systemdテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 229-4ubuntu21.10

After a standard system update you need to reboot your computer to make all the necessary changes.

References: テつ https://usn.ubuntu.com/usn/usn-3816-3 テつ https://usn.ubuntu.com/usn/usn-3816-1 テつ https://launchpad.net/bugs/1804847

Package Information: テつ https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.10

Original Source

Url : http://www.ubuntu.com/usn/USN-3816-3

CWE : Common Weakness Enumeration

%idName
33 %CWE-502Deserialization of Untrusted Data
33 %CWE-362Race Condition
33 %CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application15
Os3
Os1

Nessusツョ Vulnerability Scanner

DateDescription
2018-11-20Name : The remote Debian host is missing a security update.
File : debian_DLA-1580.nasl - Type : ACT_GATHER_INFO
2018-10-31Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201810-10.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2018-12-10 21:21:42
  • Multiple Updates
2018-11-27 21:20:08
  • First insertion