Ubuntu 4269-1: systemd vulnerabilities

    Date 05 Feb 2020
    316
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in systemd.
    ==========================================================================
    Ubuntu Security Notice USN-4269-1
    February 05, 2020
    
    systemd vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 19.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in systemd.
    
    Software Description:
    - systemd: system and service manager
    
    Details:
    
    It was discovered that systemd incorrectly handled certain PIDFile files.
    A local attacker could possibly use this issue to trick systemd into
    killing privileged processes. This issue only affected Ubuntu 16.04 LTS.
    (CVE-2018-16888)
    
    It was discovered that systemd incorrectly handled certain udevadm trigger
    commands. A local attacker could possibly use this issue to cause systemd
    to consume resources, leading to a denial of service. (CVE-2019-20386)
    
    Jann Horn discovered that systemd incorrectly handled services that use the
    DynamicUser property. A local attacker could possibly use this issue to
    access resources owned by a different service in the future. This issue
    only affected Ubuntu 18.04 LTS. (CVE-2019-3843, CVE-2019-3844)
    
    Tavis Ormandy discovered that systemd incorrectly handled certain Polkit
    queries. A local attacker could use this issue to cause systemd to crash,
    resulting in a denial of service, or possibly execute arbitrary code and
    escalate privileges. (CVE-2020-1712)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 19.10:
      systemd                         242-7ubuntu3.6
    
    Ubuntu 18.04 LTS:
      systemd                         237-3ubuntu10.38
    
    Ubuntu 16.04 LTS:
      systemd                         229-4ubuntu21.27
    
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4269-1
      CVE-2018-16888, CVE-2019-20386, CVE-2019-3843, CVE-2019-3844,
      CVE-2020-1712
    
    Package Information:
      https://launchpad.net/ubuntu/+source/systemd/242-7ubuntu3.6
      https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.38
      https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.27
    
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.