Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:0097-1

Опубликовано: 29 янв. 2019
Источник: suse-cvrf

Описание

Security update for systemd

This update for systemd provides the following fixes:

Security issues fixed:

  • CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
  • CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
  • Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

  • core: Queue loading transient units after setting their properties. (bsc#1115518)
  • logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
  • terminal-util: introduce vt_release() and vt_restore() helpers.
  • terminal: Unify code for resetting kbd utf8 mode a bit.
  • terminal Reset should honour default_utf8 kernel setting.
  • logind: Make session_restore_vt() static.
  • udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
  • log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
  • udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to detect non-zvm environment. The systemd-detect-virt returns exit failure code when it detected none state. The exit failure code causes that the hot-add memory block can not be set to online. (bsc#1076696)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Список пакетов

openSUSE Leap 42.3
libsystemd0-228-65.1
libsystemd0-32bit-228-65.1
libsystemd0-mini-228-65.1
libudev-devel-228-65.1
libudev-mini-devel-228-65.1
libudev-mini1-228-65.1
libudev1-228-65.1
libudev1-32bit-228-65.1
nss-myhostname-228-65.1
nss-myhostname-32bit-228-65.1
nss-mymachines-228-65.1
systemd-228-65.1
systemd-32bit-228-65.1
systemd-bash-completion-228-65.1
systemd-devel-228-65.1
systemd-logger-228-65.1
systemd-mini-228-65.1
systemd-mini-bash-completion-228-65.1
systemd-mini-devel-228-65.1
systemd-mini-sysvinit-228-65.1
systemd-sysvinit-228-65.1
udev-228-65.1
udev-mini-228-65.1

Описание

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.


Затронутые продукты
openSUSE Leap 42.3:libsystemd0-228-65.1
openSUSE Leap 42.3:libsystemd0-32bit-228-65.1
openSUSE Leap 42.3:libsystemd0-mini-228-65.1
openSUSE Leap 42.3:libudev-devel-228-65.1

Ссылки

Описание

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.


Затронутые продукты
openSUSE Leap 42.3:libsystemd0-228-65.1
openSUSE Leap 42.3:libsystemd0-32bit-228-65.1
openSUSE Leap 42.3:libsystemd0-mini-228-65.1
openSUSE Leap 42.3:libudev-devel-228-65.1

Ссылки

Описание

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.


Затронутые продукты
openSUSE Leap 42.3:libsystemd0-228-65.1
openSUSE Leap 42.3:libsystemd0-32bit-228-65.1
openSUSE Leap 42.3:libsystemd0-mini-228-65.1
openSUSE Leap 42.3:libudev-devel-228-65.1

Ссылки