{"id":"USN-3816-1","summary":"systemd vulnerabilities","details":"Jann Horn discovered that unit_deserialize incorrectly handled status messages\nabove a certain length. A local attacker could potentially exploit this via\nNotifyAccess to inject arbitrary state across re-execution and obtain root\nprivileges. (CVE-2018-15686)\n\nJann Horn discovered a race condition in chown_one(). A local attacker\ncould potentially exploit this by setting arbitrary permissions on certain\nfiles to obtain root privileges. This issue only affected Ubuntu 18.04 LTS\nand Ubuntu 18.10. (CVE-2018-15687)\n\nIt was discovered that systemd-tmpfiles mishandled symlinks in\nnon-terminal path components. A local attacker could potentially exploit\nthis by gaining ownership of certain files to obtain root privileges. This\nissue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-6954)\n","modified":"2026-04-22T09:52:05.242216Z","published":"2018-11-12T17:32:15Z","related":["UBUNTU-CVE-2018-15686","UBUNTU-CVE-2018-15687","UBUNTU-CVE-2018-6954"],"upstream":["CVE-2018-15686","CVE-2018-15687","CVE-2018-6954","UBUNTU-CVE-2018-15686","UBUNTU-CVE-2018-15687","UBUNTU-CVE-2018-6954"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3816-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6954"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-15686"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-15687"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/systemd@229-4ubuntu21.8?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu21.8"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13","229-4ubuntu16","229-4ubuntu17","229-4ubuntu19","229-4ubuntu20","229-4ubuntu21","229-4ubuntu21.1","229-4ubuntu21.2","229-4ubuntu21.3","229-4ubuntu21.4","229-4ubuntu21.5","229-4ubuntu21.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"229-4ubuntu21.8","binary_name":"libnss-myhostname"},{"binary_version":"229-4ubuntu21.8","binary_name":"libnss-mymachines"},{"binary_version":"229-4ubuntu21.8","binary_name":"libnss-resolve"},{"binary_version":"229-4ubuntu21.8","binary_name":"libpam-systemd"},{"binary_version":"229-4ubuntu21.8","binary_name":"libsystemd0"},{"binary_version":"229-4ubuntu21.8","binary_name":"libudev1"},{"binary_version":"229-4ubuntu21.8","binary_name":"systemd"},{"binary_version":"229-4ubuntu21.8","binary_name":"systemd-container"},{"binary_version":"229-4ubuntu21.8","binary_name":"systemd-coredump"},{"binary_version":"229-4ubuntu21.8","binary_name":"systemd-journal-remote"},{"binary_version":"229-4ubuntu21.8","binary_name":"systemd-sysv"},{"binary_version":"229-4ubuntu21.8","binary_name":"udev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3816-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15686"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15687"}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"systemd","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/systemd@237-3ubuntu10.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"237-3ubuntu10.6"}]}],"versions":["234-2ubuntu12","235-2ubuntu3","235-3ubuntu2","235-3ubuntu3","237-3ubuntu3","237-3ubuntu4","237-3ubuntu6","237-3ubuntu7","237-3ubuntu8","237-3ubuntu10","237-3ubuntu10.2","237-3ubuntu10.3","237-3ubuntu10.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"237-3ubuntu10.6","binary_name":"libnss-myhostname"},{"binary_version":"237-3ubuntu10.6","binary_name":"libnss-mymachines"},{"binary_version":"237-3ubuntu10.6","binary_name":"libnss-resolve"},{"binary_version":"237-3ubuntu10.6","binary_name":"libnss-systemd"},{"binary_version":"237-3ubuntu10.6","binary_name":"libpam-systemd"},{"binary_version":"237-3ubuntu10.6","binary_name":"libsystemd0"},{"binary_version":"237-3ubuntu10.6","binary_name":"libudev1"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd-container"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd-coredump"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd-journal-remote"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd-sysv"},{"binary_version":"237-3ubuntu10.6","binary_name":"systemd-tests"},{"binary_version":"237-3ubuntu10.6","binary_name":"udev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3816-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15686"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15687"}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.5"}