Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-0368

Опубликовано: 19 фев. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-0368: systemd security update (IMPORTANT)

[219-62.0.4]

  • do not create utmp update symlinks for reboot and poweroff [Orabug: 27854896]
  • OL7 udev rule for virtio net standby interface [Orabug: 28826743]
  • fix _netdev is missing for iscsi entry in /etc/fstab [Orabug: 25897792] (tony.l.lam@oracle.com)
  • set 'RemoveIPC=no' in logind.conf as default for OL7.2 [22224874]
  • allow dm remove ioctl to co-operate with UEK3 (Vaughan Cao) [Orabug: 18467469]
  • add hv dynamic memory support (Jerry Snitselaar) [Orabug: 18621475]

[219-62.5]

  • sd-bus: if we receive an invalid dbus message, ignore and proceeed (#1667871)

[219-62.4]

  • Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit. (#1667870)
  • Allocate temporary strings to hold dbus paths on the heap (#1667870)

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

libgudev1

219-62.0.4.el7_6.5

libgudev1-devel

219-62.0.4.el7_6.5

systemd

219-62.0.4.el7_6.5

systemd-devel

219-62.0.4.el7_6.5

systemd-journal-gateway

219-62.0.4.el7_6.5

systemd-libs

219-62.0.4.el7_6.5

systemd-networkd

219-62.0.4.el7_6.5

systemd-python

219-62.0.4.el7_6.5

systemd-resolved

219-62.0.4.el7_6.5

systemd-sysv

219-62.0.4.el7_6.5

Oracle Linux x86_64

libgudev1

219-62.0.4.el7_6.5

libgudev1-devel

219-62.0.4.el7_6.5

systemd

219-62.0.4.el7_6.5

systemd-devel

219-62.0.4.el7_6.5

systemd-journal-gateway

219-62.0.4.el7_6.5

systemd-libs

219-62.0.4.el7_6.5

systemd-networkd

219-62.0.4.el7_6.5

systemd-python

219-62.0.4.el7_6.5

systemd-resolved

219-62.0.4.el7_6.5

systemd-sysv

219-62.0.4.el7_6.5

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

CVSS3: 7
redhat
больше 6 лет назад

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

CVSS3: 5.5
nvd
больше 6 лет назад

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).

CVSS3: 5.5
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 5.5
debian
больше 6 лет назад

An issue was discovered in sd-bus in systemd 239. bus_process_object() ...