Lucene search

K
suseSuseOPENSUSE-SU-2021:3348-1
HistoryOct 12, 2021 - 12:00 a.m.

Security update for systemd (moderate)

2021-10-1200:00:00
lists.opensuse.org
64

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

An update that solves one vulnerability, contains one
feature and has 8 fixes is now available.

Description:

This update for systemd fixes the following issues:

  • CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

  • logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).

  • Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).

  • Rules weren’t applied to dm devices (multipath) (bsc#1188713).

  • Ignore obsolete β€œelevator” kernel parameter (bsc#1184994, bsc#1190234).

  • Make sure the versions of both udev and systemd packages are always the
    same (bsc#1189480).

  • Avoid error message when udev is updated due to udev being already
    active when the sockets are started again (bsc#1188291).

  • Allow the systemd sysusers config files to be overriden during system
    installation (bsc#1171962).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or β€œzypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2021-3348=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.3noarch<Β - openSUSE Leap 15.3 (noarch):- openSUSE Leap 15.3 (noarch):.noarch.rpm

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C