19 February 2019
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0512 systemd vulnerability 19 February 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: systemd Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-6454 Reference: ESB-2019.0503 Original Bulletin: http://www.ubuntu.com/usn/usn-3891-1 - --------------------------BEGIN INCLUDED TEXT-------------------- Ubuntu Security Notice USN-3891-1 February 18, 2019 systemd vulnerability A security issue affects these releases of Ubuntu and its derivatives: - - Ubuntu 18.10 - - Ubuntu 18.04 LTS - - Ubuntu 16.04 LTS Summary: systemd could be made to crash if it received specially a crafted D-Bus message. Software Description: - - systemd: system and service manager Details: It was discovered that systemd incorrectly handled certain D-Bus messages= =2E A local unprivileged attacker could exploit this in order to crash the init process, resulting in a system denial-of-service (kernel panic). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10: libsystemd0 239-7ubuntu10.8 systemd 239-7ubuntu10.8 Ubuntu 18.04 LTS: libsystemd0 237-3ubuntu10.13 systemd 237-3ubuntu10.13 Ubuntu 16.04 LTS: libsystemd0 229-4ubuntu21.16 systemd 229-4ubuntu21.16 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3891-1 CVE-2019-6454 Package Information: https://launchpad.net/ubuntu/+source/systemd/239-7ubuntu10.8 https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.13 https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.16 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to email@example.com and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: firstname.lastname@example.org Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXGtZuWaOgq3Tt24GAQjc9xAA0g51IYLZpVrdOYdqIaKzQiRs5PLD3wIm 2FxAmgDhW78CJGG6SRYlAjHxRfZJb5Is3SijLXWqp7LSx9pwk3PdSOVc+NikoSKu NvbBhBBSihDbAoWzzkGPbp0YarmzI9eFZkQk8BDZfYd9FhCyCHaSg7GoeWcDTQgd djQBgsQAb3YvNiiDE77sRh25t6IskUIfXw9eC4DcClia+JMcrozyxhvjQTo1Qzsu HUXnY2aXHGNiCMbZJWcpuCL31BnOVHUL7yzIy2v507E6npydr+FgW0Gvbu2YbDfl GX9AosvrjYwqTR/p/eSNv630oDLSfMtw0ESv0kJRvVvRdLF5l8r7vi1Yoggttjv9 Ezi6DnPv+gu6czZPu7bXwW6wOnaE18Kp7wQlCr/N7g5XNgsWpNyBI6g73lHZ7Dh0 JSdMwF/pef6Y7aYpCuSN37uD92aTKgOjD5qncKYijw46d0cJMeZ0fd4BnNZPA0OF QXyd6N9GXdHoDhrXDHT4Ianp/Ha65pnxEQs5q2s86Wa4iJEFXvaK9BK0e170ZoYh IYvMTrFkxlmLl/0DC8F3Fpjs1QrCj5/uo0Xn2e7tbbCcTh5NMmaGiWRUqWCK7sun wTX9gF6uSUVQe9nB5Pwmeruvry73t/EZZm1HFROi+e5fB6Q+AzBCbzJ1M/8w0bAk VKwr5tkb6js= =HqK0 -----END PGP SIGNATURE-----