Lucene search

K
suseSuseOPENSUSE-SU-2019:0268-1
HistoryMar 01, 2019 - 12:00 a.m.

Security update for systemd (important)

2019-03-0100:00:00
lists.opensuse.org
180

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

8.1%

An update that solves one vulnerability and has 8 fixes is
now available.

Description:

This update for systemd fixes the following issues:

Security vulnerability fixed:

  • CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
    message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

  • journal-remote: set a limit on the number of fields in a message
  • journal-remote: verify entry length from header
  • journald: set a limit on the number of fields (1k)
  • journald: do not store the iovec entry for process commandline on stack
  • core: include Found state in device dumps
  • device: fix serialization and deserialization of DeviceFound
  • fix path in btrfs rule (#6844)
  • assemble multidevice btrfs volumes without external tools (#6607)
    (bsc#1117025)
  • Update systemd-system.conf.xml (bsc#1122000)
  • units: inform user that the default target is started after exiting from
    rescue or emergency mode
  • manager: don’t skip sigchld handler for main and control pid for
    services (#3738)
  • core: Add helper functions unit_{main, control}_pid
  • manager: Fixing a debug printf formatting mistake (#3640)
  • manager: Only invoke a single sigchld per unit within a cleanup cycle
    (bsc#1117382)
  • core: update invoke_sigchld_event() to handle NULL ->sigchld_event()
  • sd-event: expose the event loop iteration counter via
    sd_event_get_iteration() (#3631)
  • unit: rework a bit how we keep the service fdstore from being destroyed
    during service restart (bsc#1122344)
  • core: when restarting services, don’t close fds
  • cryptsetup: Add dependency on loopback setup to generated units
  • journal-gateway: use localStorage[“cursor”] only when it has valid value
  • journal-gateway: explicitly declare local variables
  • analyze: actually select longest activated-time of services
  • sd-bus: fix implicit downcast of bitfield reported by LGTM
  • core: free lines after reading them (bsc#1123892)
  • pam_systemd: reword message about not creating a session (bsc#1111498)
  • pam_systemd: suppress LOG_DEBUG log messages if debugging is off
    (bsc#1111498)
  • main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
  • sd-bus: if we receive an invalid dbus message, ignore and proceeed
  • automount: don’t pass non-blocking pipe to kernel.
  • units: make sure initrd-cleanup.service terminates before switching to
    rootfs (bsc#1123333)
  • units: add Wants=initrd-cleanup.service to initrd-switch-root.target
    (#4345) (bsc#1123333)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 42.3:

    zypper in -t patch openSUSE-2019-268=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap42.3i586< - openSUSE Leap 42.3 (i586 x86_64):- openSUSE Leap 42.3 (i586 x86_64):.i586.rpm
openSUSE Leap42.3x86_64< - openSUSE Leap 42.3 (i586 x86_64):- openSUSE Leap 42.3 (i586 x86_64):.x86_64.rpm
openSUSE Leap42.3x86_64< - openSUSE Leap 42.3 (x86_64):- openSUSE Leap 42.3 (x86_64):.x86_64.rpm
openSUSE Leap42.3noarch< - openSUSE Leap 42.3 (noarch):- openSUSE Leap 42.3 (noarch):.noarch.rpm

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

8.1%