Operating System:

[Debian]

Published:

23 January 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0201
 Multiple vulnerabilities were found in the journald component of systemd
                              23 January 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           systemd
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Root Compromise   -- Remote/Unauthenticated
                   Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-16865 CVE-2018-16864 

Reference:         ESB-2019.0126.2
                   ESB-2018.3569.3

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : systemd
Version        : 215-17+deb8u9
CVE ID         : CVE-2018-16864 CVE-2018-16865
Debian Bug     : 918841 918848

Multiple vulnerabilities were found in the journald component of
systemd which can lead to a crash or code execution.

CVE-2018-16864

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when many entries are sent to the journal
    socket. A local attacker, or a remote one if
    systemd-journal-remote is used, may use this flaw to crash
    systemd-journald or execute code with journald privileges.

CVE-2018-16865

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when a program with long command line arguments
    calls syslog. A local attacker may use this flaw to crash
    systemd-journald or escalate his privileges. Versions through v240
    are vulnerable.

For Debian 8 "Jessie", these problems have been fixed in version
215-17+deb8u9.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXEf/L2aOgq3Tt24GAQg3gRAAsNP1VGcJV1vhYc3l7hPNjNaxnrDIgvb7
Db4Y82g8RY90yfGjlrD6XRwJaRQgaiK2K0sbYJputUisHN7RqWj/iG5jnP/2Ee8t
qzGLLlZWfv1F4aL8Tk9gq43W7pT+VkUMzhZEzfBIf+mO1cAAlJhsPafzn4Y7ZUKn
M3cQeKBkWAhQP+zBIDNl9KUMD6UlsIk6IoFP9+W+ykXG081vmB8/UA5D+zJZ+Lcx
wAevZa5Bvb9cEsA25O8e4/zTZmuZnr6ATobmgInDPCeSewO6Q3vUfI9dasb8j3Sq
dIFKcpvIVTozPUKq/k9mIYXN6jgJ+eFu7fXCVRLSzh8UCqB0bwxjReKOV1UnX96S
YTwskOsks8C+KgsqZ6UhEthfcTOeD8mAVsLgjO5CgjFbRhz2atxHO5ZK1QjdoaHK
N72//Toh735ihMUw+oWF0tobqsudUY40Ip7zbvwi9unVC7Afz99td05GA6jkT2U3
QwIV4h6nVJemgtqVNqOIRV+ECbvvUXymEmc8tpT6yjY+hxWAIGJYJZPoPqsJTBXi
nEBkTAlxUzrcVTQutbngEgsJJEo/33uxedi4iwknFLna+fuN2yFIlcEOF/H9aI+c
xXfZYLU+ltF25pOOYA7qndKxkHyL1hKza+Pi738L+OO6mkiZdEaCsDqJOkO85v+t
LaQYy54s+yM=
=tIH+
-----END PGP SIGNATURE-----