Arch Linux update for systemd

Published: 2019-01-13 12:28:50 | Updated: 2019-01-13
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-16864
CVE-2018-16865
CVSSv3 7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software Arch Linux
Vulnerable software versions Arch Linux -
Vendor URL Arch Linux

Security Advisory

1) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to boundary error when handling malicious input. A local attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges to conduct further attacks.

Remediation

Update the affected package systemd to version 240.34-1.

External links

https://security.archlinux.org/advisory/ASA-201901-9

2) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to boundary error when handling malicious input. A local attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges to conduct further attacks.

Remediation

Update the affected package systemd to version 240.34-1.

External links

https://security.archlinux.org/advisory/ASA-201901-9

Back to List