Lucene search

K
suseSuseOPENSUSE-SU-2020:0208-1
HistoryFeb 11, 2020 - 12:00 a.m.

Security update for systemd (important)

2020-02-1100:00:00
lists.opensuse.org
62

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

An update that solves two vulnerabilities and has 12 fixes
is now available.

Description:

This update for systemd fixes the following issues:

  • CVE-2020-1712 (bsc#bsc#1162108) Fix a heap use-after-free vulnerability,
    when asynchronous Polkit queries were performed while handling Dbus
    messages. A local unprivileged attacker could have abused this flaw to
    crash systemd services or potentially execute code and elevate their
    privileges, by sending specially crafted Dbus messages.

  • Use suse.pool.ntp.org server pool on SLE distros (jsc#SLE-7683)

  • libblkid: open device in nonblock mode. (bsc#1084671)

  • udev/cdrom_id: Do not open CD-rom in exclusive mode. (bsc#1154256)

  • bus_open leak sd_event_source when udevadm trigger。 (bsc#1161436
    CVE-2019-20386)

  • fileio: introduce read_full_virtual_file() for reading virtual files in
    sysfs, procfs (bsc#1133495 bsc#1159814)

  • fileio: initialize errno to zero before we do fread()

  • fileio: try to read one byte too much in read_full_stream()

  • logind: consider β€œgreeter” sessions suitable as β€œdisplay” sessions of a
    user (bsc#1158485)

  • logind: never elect a session that is stopping as display

  • journal: include kmsg lines from the systemd process which exec()d us
    (#8078)

  • udevd: don’t use monitor after manager_exit()

  • udevd: capitalize log messages in on_sigchld()

  • udevd: merge conditions to decrease indentation

  • Revert β€œudevd: fix crash when workers time out after exit is signal
    caught”

  • core: fragments of masked units ought not be considered for
    NeedDaemonReload (#7060) (bsc#1156482)

  • udevd: fix crash when workers time out after exit is signal caught

  • udevd: wait for workers to finish when exiting (bsc#1106383)

  • Improve bash completion support (bsc#1155207)

    • shell-completion: systemctl: do not list template units in {re,}start
    • shell-completion: systemctl: pass current word to all list_unit*
    • bash-completion: systemctl: pass current partial unit to list-unit*
      (bsc#1155207)
    • bash-completion: systemctl: use systemctl --no-pager
    • bash-completion: also suggest template unit files
    • bash-completion: systemctl: add missing options and verbs
    • bash-completion: use the first argument instead of the global variable
      (#6457)
  • networkd: VXLan Make group and remote variable separate (bsc#1156213)

  • networkd: vxlan require Remote= to be a non multicast address (#8117)
    (bsc#1156213)

  • fs-util: let’s avoid unnecessary strerror()

  • fs-util: introduce inotify_add_watch_and_warn() helper

  • ask-password: improve log message when inotify limit is reached
    (bsc#1155574)

  • shared/install: failing with -ELOOP can be due to the use of an alias in
    install_error() (bsc#1151377)

  • man: alias names can’t be used with enable command (bsc#1151377)

  • Add boot option to not use swap at system start (jsc#SLE-7689)

  • Allow YaST to select Iranian (Persian, Farsi) keyboard layout
    (bsc#1092920)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or β€œzypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-208=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1i586<Β - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.i586.rpm
openSUSE Leap15.1x86_64<Β - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.1noarch<Β - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm
openSUSE Leap15.1x86_64<Β - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P