Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-0954

Опубликовано: 01 мар. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-0954: systemd security update (MODERATE)

[250-12.0.2.3]

  • Backport upstream pstore dmesg fix [Orabug: 34868110]
  • Remove upstream references [Orabug: 33995357]
  • Disable unprivileged BPF by default [Orabug: 32870980]
  • udev rules: fix memory hot add and remove [Orabug: 31310273]
  • set 'RemoveIPC=no' in logind.conf as default for OL7.2 [Orabug: 22224874]
  • allow dm remove ioctl to co-operate with UEK3 (Vaughan Cao) [Orabug: 18467469]
  • fix _netdev is missing for iscsi entry in /etc/fstab (tony.l.lam@oracle.com) [Orabug: 25897792]
  • shutdown: get only active md arrays. [Orabug: 34467234]

[250-12.3]

  • shared/json: allow json_variant_dump() to return an error (#2149074)
  • shared/json: use different return code for empty input (#2149074)
  • coredump: avoid deadlock when passing processed backtrace data (#2149074)
  • test: disable flaky subtests that require udevadm wait/lock (#2149074)

[250-12.2]

  • coredump: adjust whitespace (#2155516)
  • basic: add STRERROR() wrapper for strerror_r() (#2155516)
  • coredump: do not allow user to access coredumps with changed uid/gid/capabilities (#2155516)
  • Packit: build SRPMs in Copr (#2155516)
  • test: support non-summer time (#2155516)
  • test: bump the base VM memory to 768M (#2155516)
  • test: don't overwrite existing (#2155516)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

systemd

250-12.0.2.el9_1.3

systemd-container

250-12.0.2.el9_1.3

systemd-devel

250-12.0.2.el9_1.3

systemd-journal-remote

250-12.0.2.el9_1.3

systemd-libs

250-12.0.2.el9_1.3

systemd-oomd

250-12.0.2.el9_1.3

systemd-pam

250-12.0.2.el9_1.3

systemd-resolved

250-12.0.2.el9_1.3

systemd-rpm-macros

250-12.0.2.el9_1.3

systemd-udev

250-12.0.2.el9_1.3

Oracle Linux x86_64

systemd

250-12.0.2.el9_1.3

systemd-container

250-12.0.2.el9_1.3

systemd-devel

250-12.0.2.el9_1.3

systemd-journal-remote

250-12.0.2.el9_1.3

systemd-libs

250-12.0.2.el9_1.3

systemd-oomd

250-12.0.2.el9_1.3

systemd-pam

250-12.0.2.el9_1.3

systemd-resolved

250-12.0.2.el9_1.3

systemd-rpm-macros

250-12.0.2.el9_1.3

systemd-udev

250-12.0.2.el9_1.3

Связанные CVE

Связанные уязвимости

rocky
больше 2 лет назад

Moderate: systemd security update

CVSS3: 5.5
ubuntu
больше 2 лет назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
redhat
почти 3 года назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
nvd
больше 2 лет назад

systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.

CVSS3: 5.5
msrc
больше 2 лет назад

Описание отсутствует