MGASA-2021-0365 - Updated systemd packages fix security vulnerabilities

Publication date: 22 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0365.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2020-13529,
     CVE-2021-33910

This systemd update provides the v246.15 maintenance release and fixes
atleast the following security issues:

An exploitable denial-of-service vulnerability exists in Systemd 245.
A specially crafted DHCP FORCERENEW packet can cause a server running
the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An
attacker can forge a pair of FORCERENEW and DCHP ACK packets to
reconfigure the server (CVE-2020-13529).

basic/unit-name.c in systemd 220 through 248 has a Memory Allocation with
an Excessive Size Value (involving strdupa and alloca for a pathname
controlled by a local attacker) that results in an operating system crash
(CVE-2021-29270).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29270
- https://github.com/systemd/systemd-stable/compare/v246.13...v246.15
- https://www.openwall.com/lists/oss-security/2021/07/20/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910

SRPMS:
- 8/core/systemd-246.15-1.mga8

Mageia 2021-0365: systemd security update

This systemd update provides the v246.15 maintenance release and fixes atleast the following security issues: An exploitable denial-of-service vulnerability exists in Systemd 245

Summary

This systemd update provides the v246.15 maintenance release and fixes atleast the following security issues:
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server (CVE-2020-13529).
basic/unit-name.c in systemd 220 through 248 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash (CVE-2021-29270).

References

- https://bugs.mageia.org/show_bug.cgi?id=29270

- https://github.com/systemd/systemd-stable/compare/v246.13...v246.15

- https://www.openwall.com/lists/oss-security/2021/07/20/2

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910

Resolution

MGASA-2021-0365 - Updated systemd packages fix security vulnerabilities

SRPMS

- 8/core/systemd-246.15-1.mga8

Severity
Publication date: 22 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0365.html
Type: security
CVE: CVE-2020-13529, CVE-2021-33910