Package        : systemd
Version        : 215-17+deb8u9
CVE ID         : CVE-2018-16864 CVE-2018-16865
Debian Bug     : 918841 918848

Multiple vulnerabilities were found in the journald component of
systemd which can lead to a crash or code execution.

CVE-2018-16864

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when many entries are sent to the journal
    socket. A local attacker, or a remote one if
    systemd-journal-remote is used, may use this flaw to crash
    systemd-journald or execute code with journald privileges.

CVE-2018-16865

    An allocation of memory without limits, that could result in the
    stack clashing with another memory region, was discovered in
    systemd-journald when a program with long command line arguments
    calls syslog. A local attacker may use this flaw to crash
    systemd-journald or escalate his privileges. Versions through v240
    are vulnerable.

For Debian 8 "Jessie", these problems have been fixed in version
215-17+deb8u9.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1639-1: systemd security update

January 23, 2019
Multiple vulnerabilities were found in the journald component of systemd which can lead to a crash or code execution

Summary

An allocation of memory without limits, that could result in the
stack clashing with another memory region, was discovered in
systemd-journald when many entries are sent to the journal
socket. A local attacker, or a remote one if
systemd-journal-remote is used, may use this flaw to crash
systemd-journald or execute code with journald privileges.

CVE-2018-16865

An allocation of memory without limits, that could result in the
stack clashing with another memory region, was discovered in
systemd-journald when a program with long command line arguments
calls syslog. A local attacker may use this flaw to crash
systemd-journald or escalate his privileges. Versions through v240
are vulnerable.

For Debian 8 "Jessie", these problems have been fixed in version
215-17+deb8u9.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
f...

Read the Full Advisory


Severity
Package        : systemd 
Version : 215-17+deb8u9
CVE ID : CVE-2018-16864 CVE-2018-16865
Debian Bug : 918841 918848

Related News