ESB-2019.0111.2 - UPDATE [Linux][SUSE] systemd: Root compromise - Existing account - 2019-04-15


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.0111.2
                       Security updates for systemd
                               15 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           systemd
Publisher:         SUSE
Operating System:  SUSE
                   Linux variants
Impact/Access:     Root Compromise -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-16865 CVE-2018-16864 CVE-2018-15686

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20190053-1/
   https://www.suse.com/support/update/announcement/2019/suse-su-20190054-1/
   https://www.suse.com/support/update/announcement/2019/suse-su-20190054-2/

Comment: This bulletin contains three (3) SUSE security advisories.

Revision History:  April   15 2019: Update for SUSE Linux Enterprise Server 
				    for SAP 12-SP1
                   January 11 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0053-1
Rating:             important
References:         #1068588 #1071558 #1113665 #1120323 
Cross-References:   CVE-2018-15686 CVE-2018-16864 CVE-2018-16865
                   
Affected Products:
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for systemd fixes the following issues:

   * Fix security vulnerabilities CVE-2018-16864 and CVE-2018-16865
     (bsc#1120323): Both issues were memory corruptions via
     attacker-controlled alloca which could have been used to gain root
     privileges by a local attacker.

   * Fix security vulnerability CVE-2018-15686 (bsc#1113665): A vulnerability
     in unit_deserialize of systemd used to allow an attacker to supply
     arbitrary state across systemd re-execution via NotifyAccess. This could
     have been used to improperly influence systemd execution and possibly
     lead to root privilege escalation.

   * Remedy 2048 character line-length limit in systemd-sysctl code that
     would cause parser failures if /etc/sysctl.conf contained lines that
     exceeded this length (bsc#1071558).

   * Fix a bug in systemd's core timer code that would cause timer looping
     under certain conditions, resulting in hundreds of syslog messages being
     written to the journal (bsc#1068588).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2019-53=1



Package List:

   - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

      libgudev-1_0-0-210-70.74.1
      libgudev-1_0-0-debuginfo-210-70.74.1
      libgudev-1_0-devel-210-70.74.1
      libudev-devel-210-70.74.1
      libudev1-210-70.74.1
      libudev1-debuginfo-210-70.74.1
      systemd-210-70.74.1
      systemd-debuginfo-210-70.74.1
      systemd-debugsource-210-70.74.1
      systemd-devel-210-70.74.1
      systemd-sysvinit-210-70.74.1
      typelib-1_0-GUdev-1_0-210-70.74.1
      udev-210-70.74.1
      udev-debuginfo-210-70.74.1

   - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):

      libgudev-1_0-0-32bit-210-70.74.1
      libgudev-1_0-0-debuginfo-32bit-210-70.74.1
      libudev1-32bit-210-70.74.1
      libudev1-debuginfo-32bit-210-70.74.1
      systemd-32bit-210-70.74.1
      systemd-debuginfo-32bit-210-70.74.1

   - SUSE Linux Enterprise Server 12-LTSS (noarch):

      systemd-bash-completion-210-70.74.1


References:

   https://www.suse.com/security/cve/CVE-2018-15686.html
   https://www.suse.com/security/cve/CVE-2018-16864.html
   https://www.suse.com/security/cve/CVE-2018-16865.html
   https://bugzilla.suse.com/1068588
   https://bugzilla.suse.com/1071558
   https://bugzilla.suse.com/1113665
   https://bugzilla.suse.com/1120323

- ---

   SUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0054-1
Rating:             important
References:         #1068588 #1071558 #1113665 #1120323 
Cross-References:   CVE-2018-15686 CVE-2018-16864 CVE-2018-16865
                   
Affected Products:
                    SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for systemd fixes the following issues:

   * Fix security vulnerabilities CVE-2018-16864 and CVE-2018-16865
     (bsc#1120323): Both issues were memory corruptions via
     attacker-controlled alloca which could have been used to gain root
     privileges by a local attacker.

   * Fix security vulnerability CVE-2018-15686 (bsc#1113665): A vulnerability
     in unit_deserialize of systemd used to allow an attacker to supply
     arbitrary state across systemd re-execution via NotifyAccess. This could
     have been used to improperly influence systemd execution and possibly
     lead to root privilege escalation.

   * Remedy 2048 character line-length limit in systemd-sysctl code that
     would cause parser failures if /etc/sysctl.conf contained lines that
     exceeded this length (bsc#1071558).

   * Fix a bug in systemd's core timer code that would cause timer looping
     under certain conditions, resulting in hundreds of syslog messages being
     written to the journal (bsc#1068588).

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-54=1

Package List:

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      libgudev-1_0-0-210-116.19.1
      libgudev-1_0-0-debuginfo-210-116.19.1
      libgudev-1_0-devel-210-116.19.1
      libudev-devel-210-116.19.1
      libudev1-210-116.19.1
      libudev1-debuginfo-210-116.19.1
      systemd-210-116.19.1
      systemd-debuginfo-210-116.19.1
      systemd-debugsource-210-116.19.1
      systemd-devel-210-116.19.1
      systemd-sysvinit-210-116.19.1
      typelib-1_0-GUdev-1_0-210-116.19.1
      udev-210-116.19.1
      udev-debuginfo-210-116.19.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x x86_64):

      libgudev-1_0-0-32bit-210-116.19.1
      libgudev-1_0-0-debuginfo-32bit-210-116.19.1
      libudev1-32bit-210-116.19.1
      libudev1-debuginfo-32bit-210-116.19.1
      systemd-32bit-210-116.19.1
      systemd-debuginfo-32bit-210-116.19.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

      systemd-bash-completion-210-116.19.1

References:

   https://www.suse.com/security/cve/CVE-2018-15686.html
   https://www.suse.com/security/cve/CVE-2018-16864.html
   https://www.suse.com/security/cve/CVE-2018-16865.html
   https://bugzilla.suse.com/1068588
   https://bugzilla.suse.com/1071558
   https://bugzilla.suse.com/1113665
   https://bugzilla.suse.com/1120323

- ---

SUSE Security Update: Security update for systemd

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:0054-2
Rating:            important
References:        #1068588 #1071558 #1113665 #1120323
Cross-References:  CVE-2018-15686 CVE-2018-16864 CVE-2018-16865
Affected Products:
                   SUSE Linux Enterprise Server for SAP 12-SP1
______________________________________________________________________________

An update that solves three vulnerabilities and has one errata is now
available.

Description:

This update for systemd fixes the following issues:

  o Fix security vulnerabilities CVE-2018-16864 and CVE-2018-16865 (bsc#
    1120323): Both issues were memory corruptions via attacker-controlled
    alloca which could have been used to gain root privileges by a local
    attacker.

  o Fix security vulnerability CVE-2018-15686 (bsc#1113665): A vulnerability in
    unit_deserialize of systemd used to allow an attacker to supply arbitrary
    state across systemd re-execution via NotifyAccess. This could have been
    used to improperly influence systemd execution and possibly lead to root
    privilege escalation.

  o Remedy 2048 character line-length limit in systemd-sysctl code that would
    cause parser failures if /etc/sysctl.conf contained lines that exceeded
    this length (bsc#1071558).

  o Fix a bug in systemd's core timer code that would cause timer looping under
    certain conditions, resulting in hundreds of syslog messages being written
    to the journal (bsc#1068588).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 12-SP1:
    zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-54=1

Package List:

  o SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
       libgudev-1_0-0-210-116.19.1
       libgudev-1_0-0-32bit-210-116.19.1
       libgudev-1_0-0-debuginfo-210-116.19.1
       libgudev-1_0-0-debuginfo-32bit-210-116.19.1
       libgudev-1_0-devel-210-116.19.1
       libudev-devel-210-116.19.1
       libudev1-210-116.19.1
       libudev1-32bit-210-116.19.1
       libudev1-debuginfo-210-116.19.1
       libudev1-debuginfo-32bit-210-116.19.1
       systemd-210-116.19.1
       systemd-32bit-210-116.19.1
       systemd-debuginfo-210-116.19.1
       systemd-debuginfo-32bit-210-116.19.1
       systemd-debugsource-210-116.19.1
       systemd-devel-210-116.19.1
       systemd-sysvinit-210-116.19.1
       typelib-1_0-GUdev-1_0-210-116.19.1
       udev-210-116.19.1
       udev-debuginfo-210-116.19.1
  o SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):
       systemd-bash-completion-210-116.19.1

References:

  o https://www.suse.com/security/cve/CVE-2018-15686.html
  o https://www.suse.com/security/cve/CVE-2018-16864.html
  o https://www.suse.com/security/cve/CVE-2018-16865.html
  o https://bugzilla.suse.com/1068588
  o https://bugzilla.suse.com/1071558
  o https://bugzilla.suse.com/1113665
  o https://bugzilla.suse.com/1120323

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXLO4FWaOgq3Tt24GAQgSphAAhhQXjV+445MAzELRbysHrF1jeRqIjx+z
6vWxuXtImLl5UlBjPjptTNPEoyUiucP1iC0xFzCTOTdSOweAyvWbgbGh49OycWO+
KLHQrnyJqHrH+xfKg8pmr2HKaaPcH+CNtyHSTlN+onYP/cTE3JlewsjpNF2rlj33
88FRkS9A7Q7Ol+LbKM3OZVx98Th2TkiOyCzN/hGcI7rCk5rmExSlICbcx+NKFPxf
AbRxMRbIe0jq877ZdEZLYtd78jkHB8zq77I/xE1BoCdGHPiKDwMgZ6GfwFnoNb+W
Dmnv89nrIDBa4JQJk3fYbG7Rrj+ae6W80K2IONRSCzbAWtnCPRba1hjGEN+GNXt5
JuIq6zIyyYUdSLQIqXA6piUQNBI2tU5FqLfEnouvWtcFftoKzDBGbls/Kz42DQRM
ExsuIwQ3PGIVJHxUpHPd8GI3EZTPvw2IngnKB8N8R1fOldO3JF7tIX2ZjOedp2S+
j49C2HE7K1R9TzxMpgmyOLdZx2fMbtdT41sOeIh9bR0aiCEzP0Jud67laOctSdU5
AiwPPuPdJfRIeQEv72V4BymKkgO6Ju/PuFVvcXOuweRz6lvN3VrW2dA/7RQQ594H
PW+ib+UiODaTIxNDUtT+LV3k6QCQZEnQuTTRHcbMu+4FRiyYwzetbUEZlzlZIyai
6hsVlY5bwsk=
=vZGk
-----END PGP SIGNATURE-----