Описание
ELSA-2019-0990: systemd security and bug fix update (MODERATE)
[239-13.0.1.3]
- fix _netdev is missing for iscsi entry in /etc/fstab (tony.l.lam@oracle.com) [Orabug: 25897792]
- set RemoveIPC=no in logind.conf as default for OL7.2 [Orabug: 22224874]
- allow dm remove ioctl to co-operate with UEK3 (Vaughan Cao) [Orabug: 18467469]
- add hv dynamic memory support (Jerry Snitselaar) [Orabug: 18621475]
[239-13.3]
- rebuilt
[239-13.2]
- Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit. (#1678641)
- Allocate temporary strings to hold dbus paths on the heap (#1678641)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed (#1678641)
[239-13.1]
- bus-socket: Fix line_begins() to accept word matching full string (#1692991)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
systemd
239-13.0.1.el8_0.3
systemd-container
239-13.0.1.el8_0.3
systemd-devel
239-13.0.1.el8_0.3
systemd-journal-remote
239-13.0.1.el8_0.3
systemd-libs
239-13.0.1.el8_0.3
systemd-pam
239-13.0.1.el8_0.3
systemd-tests
239-13.0.1.el8_0.3
systemd-udev
239-13.0.1.el8_0.3
Oracle Linux x86_64
systemd
239-13.0.1.el8_0.3
systemd-container
239-13.0.1.el8_0.3
systemd-devel
239-13.0.1.el8_0.3
systemd-journal-remote
239-13.0.1.el8_0.3
systemd-libs
239-13.0.1.el8_0.3
systemd-pam
239-13.0.1.el8_0.3
systemd-tests
239-13.0.1.el8_0.3
systemd-udev
239-13.0.1.el8_0.3
Связанные CVE
Связанные уязвимости
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
An issue was discovered in sd-bus in systemd 239. bus_process_object() ...