Package        : systemd
Version        : 215-17+deb8u9
CVE ID         : CVE-2018-16864 CVE-2018-16865
Debian Bug     : 918841 918848

Multiple vulnerabilities were found in the journald component of
systemd which can lead to a crash or code execution.

CVE-2018-16864

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when many entries are sent to the journal
    socket. A local attacker, or a remote one if
    systemd-journal-remote is used, may use this flaw to crash
    systemd-journald or execute code with journald privileges.

CVE-2018-16865

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when a program with long command line arguments
    calls syslog. A local attacker may use this flaw to crash
    systemd-journald or escalate his privileges. Versions through v240
    are vulnerable.

For Debian 8 "Jessie", these problems have been fixed in version
215-17+deb8u9.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1639-1: systemd security update

January 23, 2019
Multiple vulnerabilities were found in the journald component of systemd which can lead to a crash or code execution

Summary

An allocation of memory without limits, that could result in the
stack clashing with another memory region, was discovered in
systemd-journald when many entries are sent to the journal
socket. A local attacker, or a remote one if
systemd-journal-remote is used, may use this flaw to crash
systemd-journald or execute code with journald privileges.

CVE-2018-16865

An allocation of memory without limits, that could result in the
stack clashing with another memory region, was discovered in
systemd-journald when a program with long command line arguments
calls syslog. A local attacker may use this flaw to crash
systemd-journald or escalate his privileges. Versions through v240
are vulnerable.

For Debian 8 "Jessie", these problems have been fixed in version
215-17+deb8u9.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package        : systemd
Version : 215-17+deb8u9
CVE ID : CVE-2018-16864 CVE-2018-16865
Debian Bug : 918841 918848

Related News