Описание
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate privileges.
Отчет
This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Important because it allows a local attacker to crash systemd-journald or escalate his privileges. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Меры по смягчению последствий
To increase the time an attacker needs to exploit this flaw you could override the StartLimitInterval=
(called StartLimitIntervalSec in newer systemd versions) and StartLimitBurst=
settings. In this way the attack may require much longer to be successful.
To edit the journald service use sudo systemctl edit systemd-journald.service
and add:
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | systemd | Not affected | ||
Red Hat Enterprise Linux 7 | systemd | Fixed | RHSA-2019:0049 | 14.01.2019 |
Red Hat Enterprise Linux 7.3 Advanced Update Support | systemd | Fixed | RHSA-2019:2402 | 07.08.2019 |
Red Hat Enterprise Linux 7.3 Telco Extended Update Support | systemd | Fixed | RHSA-2019:2402 | 07.08.2019 |
Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions | systemd | Fixed | RHSA-2019:2402 | 07.08.2019 |
Red Hat Enterprise Linux 7.4 Extended Update Support | systemd | Fixed | RHSA-2019:0271 | 04.02.2019 |
Red Hat Enterprise Linux 7.5 Extended Update Support | systemd | Fixed | RHSA-2019:0204 | 29.01.2019 |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | redhat-release-virtualization-host | Fixed | RHSA-2019:0342 | 13.02.2019 |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | redhat-virtualization-host | Fixed | RHSA-2019:0342 | 13.02.2019 |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | rhvm-appliance | Fixed | RHSA-2019:0361 | 18.02.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS3
Связанные уязвимости
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
An allocation of memory without limits, that could result in the stack ...
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
EPSS
7.4 High
CVSS3