* SECURITY UPDATE: memory corruption in journald via attacker controlled alloca
- debian/patches/CVE-2018-16864.patch: journald: do not store the iovec
entry for process commandline on the stack
- CVE-2018-16864
* SECURITY UPDATE: memory corruption in journald via attacker controlled alloca
- debian/patches/CVE-2018-16865_1.patch: journald: set a limit on the
number of fields (1k)
- debian/patches/CVE-2018-16865_2.patch: journal-remote: set a limit on the
number of fields in a message
- CVE-2018-16865
* SECURITY UPDATE: out-of-bounds read in journald
- debian/patches/CVE-2018-16866.patch: journal: fix syslog_parse_identifier()
- CVE-2018-16866
This bug was fixed in the package systemd - 239-7ubuntu10.6
---------------
systemd (239-7ubuntu10.6) cosmic-security; urgency=medium
* SECURITY UPDATE: memory corruption in journald via attacker controlled alloca patches/ CVE-2018- 16864.patch: journald: do not store the iovec patches/ CVE-2018- 16865_1. patch: journald: set a limit on the patches/ CVE-2018- 16865_2. patch: journal-remote: set a limit on the patches/ CVE-2018- 16866.patch: journal: fix syslog_ parse_identifie r()
- debian/
entry for process commandline on the stack
- CVE-2018-16864
* SECURITY UPDATE: memory corruption in journald via attacker controlled alloca
- debian/
number of fields (1k)
- debian/
number of fields in a message
- CVE-2018-16865
* SECURITY UPDATE: out-of-bounds read in journald
- debian/
- CVE-2018-16866
* Fix LP: #1804603 - btrfs-util: unbreak tmpfiles' subvol creation patches/ btrfs-util- unbreak- tmpfiles- subvol- creation. patch patches/ series patches/ test-Set- executable- bits-on- TEST-22- TMPFILES- shell-script. patch patches/ series
- add debian/
- update debian/
* Fix LP: #1804864 - test: Set executable bits on TEST-22-TMPFILES shell scripts
- add debian/
- update debian/
-- Chris Coulson <email address hidden> Wed, 09 Jan 2019 14:37:15 +0000