Описание
Security update for systemd
This update for systemd fixes the following issues:
Security vulnerability fixed:
- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS message on the system bus by an unprivileged user (bsc#1125352)
Other bug fixes and changes:
- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL ->sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
Список пакетов
Container caasp/v4/nginx-ingress-controller:beta1
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
Container suse/sles12sp3:latest
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
Container suse/sles12sp4:latest
libsystemd0-228-150.63.1
libudev1-228-150.63.1
Image SLES12-SP4-Azure-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-EC2-HVM-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-GCE-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-OCI-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-Azure
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-Azure-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-EC2-HVM
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-GCE
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-GCE-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Image SLES12-SP4-SAP-OCI-BYOS
libsystemd0-228-150.63.1
libudev1-228-150.63.1
systemd-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Enterprise Storage 4
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Desktop 12 SP3
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Desktop 12 SP4
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server 12 SP2-BCL
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server 12 SP2-LTSS
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server 12 SP3
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server 12 SP4
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
SUSE Linux Enterprise Software Development Kit 12 SP3
libudev-devel-228-150.63.1
systemd-devel-228-150.63.1
SUSE Linux Enterprise Software Development Kit 12 SP4
libudev-devel-228-150.63.1
systemd-devel-228-150.63.1
SUSE OpenStack Cloud 7
libsystemd0-228-150.63.1
libsystemd0-32bit-228-150.63.1
libudev1-228-150.63.1
libudev1-32bit-228-150.63.1
systemd-228-150.63.1
systemd-32bit-228-150.63.1
systemd-bash-completion-228-150.63.1
systemd-sysvinit-228-150.63.1
udev-228-150.63.1
Ссылки
- Link for SUSE-SU-2019:0428-1
- E-Mail link for SUSE-SU-2019:0428-1
- SUSE Security Ratings
- SUSE Bug 1111498
- SUSE Bug 1117025
- SUSE Bug 1117382
- SUSE Bug 1120658
- SUSE Bug 1122000
- SUSE Bug 1122344
- SUSE Bug 1123333
- SUSE Bug 1123892
- SUSE Bug 1125352
- SUSE CVE CVE-2019-6454 page
Описание
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Затронутые продукты
Container caasp/v4/nginx-ingress-controller:beta1:libsystemd0-228-150.63.1
Container caasp/v4/nginx-ingress-controller:beta1:libudev1-228-150.63.1
Container caasp/v4/nginx-ingress-controller:beta1:systemd-228-150.63.1
Container suse/sles12sp3:latest:libsystemd0-228-150.63.1
Ссылки
- CVE-2019-6454
- SUSE Bug 1125352