Bug 1653867 (CVE-2018-16866)
Summary: | CVE-2018-16866 systemd: out-of-bounds read when parsing a crafted syslog message | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, bmcclain, chris.snell, dbaker, dblechte, dbodnarc, dfediuck, eedri, hagberg, jokerman, kent, kperrier, lnykryn, lpardo, lpoetter, marek.pawlowski, mgoldboi, michal.skrivanek, mmezynsk, msekleta, mvanderw, redhat, riehecky, rschiron, sabyrzhan, santony, sardella, sbonazzo, security-response-team, sherold, s, sthangav, systemd-maint-list, systemd-maint, trankin, tvainio, yturgema, zbyszek, zjedrzej |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-06 19:20:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1657794, 1664975, 1664978, 1756868, 1756869, 1756870, 1786122, 1786123 | ||
Bug Blocks: | 1653451 |
Description
Laura Pardo
2018-11-27 19:14:56 UTC
This vulnerability was introduced in systemd v221. Acknowledgments: Name: Qualys Research Labs Function syslog_parse_identifier() in journald-syslog.c file does not properly parse the log string in case it ends with a ":", returning a pointer beyond the original string's limits. A local attacker may use this flaw to get disclose systemd-journal process memory and get an information leak. The flaw was introduced in: https://github.com/systemd/systemd/commit/ec5ff4445cca6a1d786b8da36cf6fe0acc0b94c8 It was fixed with: https://github.com/systemd/systemd/commit/a6aadf4ae0bae185dc4c414d492a4a781c80ffe5 https://github.com/systemd/systemd/commit/8595102d3ddde6d25c282f965573a6de34ab4421 RHEL 7.6 ships systemd v219, but commit ec5ff4445cca6a1d786b8da36cf6fe0acc0b94c8 was backported, thus making it vulnerable to this flaw as well. This seems to be the same as https://github.com/systemd/systemd/issues/9829, fixed by https://github.com/systemd/systemd/commit/a6aadf4ae0. The provided reproducer does not work with git master. Statement: This issue affects the versions of systemd as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Red Hat Virtualization Hypervisor and Management Appliance include vulnerable versions of systemd. However, since exploitation requires local access and impact is restricted to information disclosure, this flaw is rated as having a security issue of Low. Future updates may address this issue. Created systemd tracking bugs for this issue: Affects: fedora-all [bug 1664975] External References: https://www.qualys.com/2019/01/09/system-down/system-down.txt Please update the ETA of RHEL7 systemd errata for this CVE. Please update the ETA for RHEL7 systemd errata release. In reply to comment #20: > Please update the ETA for RHEL7 systemd errata release. I'm transferring this needinfo to the analyst in charge of this. We do not release updates on ETA for errata. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2091 https://access.redhat.com/errata/RHSA-2019:2091 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16866 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2019:3222 https://access.redhat.com/errata/RHSA-2019:3222 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:0593 https://access.redhat.com/errata/RHSA-2020:0593 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2020:1264 https://access.redhat.com/errata/RHSA-2020:1264 |