Описание
Security update for systemd
This update for systemd fixes the following issues:
Security issue fixed:
- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are hardlinked, unless protected_hardlinks sysctl is on. This could be used by local attackers to gain privileges (bsc#1077925)
Non Security issues fixed:
-
core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
-
cryptsetup-generator: run cryptsetup service before swap unit (#5480)
-
udev-rules: all values can contain escaped double quotes now (#6890)
-
strv: fix buffer size calculation in strv_join_quoted()
-
tmpfiles: change ownership of symlinks too
-
stdio-bridge: Correctly propagate error
-
stdio-bridge: remove dead code
-
remove bus-proxyd (bsc#1057974)
-
core/timer: Prevent timer looping when unit cannot start (bsc#1068588)
-
Make systemd-timesyncd use the openSUSE NTP servers by default Previously systemd-timesyncd used the Google Public NTP servers time{1..4}.google.com
-
Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224) But we still ship a copy in /var. Users who want to use tmpfs on /tmp are supposed to add a symlink in /etc/ pointing to the copy shipped in /var. To support the update path we automatically create the symlink if tmp.mount in use is located in /usr.
-
Enable systemd-networkd on Leap distros only (bsc#1071311)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Список пакетов
openSUSE Leap 42.3
Ссылки
- E-Mail link for openSUSE-SU-2018:0560-1
- SUSE Security Ratings
Описание
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Затронутые продукты
Ссылки
- CVE-2017-18078
- SUSE Bug 1077925