SB2019080624 - Red Hat update for systemd



SB2019080624 - Red Hat update for systemd

Published: August 6, 2019

Security Bulletin ID SB2019080624
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2018-15686)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to an error in unit_deserialize of systemd. A remote attacker can supply arbitrary state across systemd re-execution via NotifyAccess and gain root privileges.


2) Out-of-bounds read (CVE-ID: CVE-2018-16866)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read when handling malicious input. A local attacker can run a specially crafted application and access memory processes data.

3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2018-16888)

The vulnerability allows a local attacker to escalate privileges on the system.

The vulnerability exists due to incorrect check the content of PIDFile files before using it to kill processes. A local attacker can who is able to write to the PIDFile of the mentioned service can trick systemd into killing other services and/or privileged processes.


Remediation

Install update from vendor's website.