SB2019080624 - Red Hat update for systemd
Published: August 6, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2018-15686)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to an error in unit_deserialize of systemd. A remote attacker can supply arbitrary state across systemd re-execution via NotifyAccess and gain root privileges.
2) Out-of-bounds read (CVE-ID: CVE-2018-16866)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to out-of-bounds read when handling malicious input. A local attacker can run a specially crafted application and access memory processes data.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2018-16888)
The vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to incorrect check the content of PIDFile files before using it to kill processes. A local attacker can who is able to write to the PIDFile of the mentioned service can trick systemd into killing other services and/or privileged processes.
Remediation
Install update from vendor's website.