Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:0268-1

Опубликовано: 28 фев. 2019
Источник: suse-cvrf

Описание

Security update for systemd

This update for systemd fixes the following issues:

Security vulnerability fixed:

  • CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

  • journal-remote: set a limit on the number of fields in a message
  • journal-remote: verify entry length from header
  • journald: set a limit on the number of fields (1k)
  • journald: do not store the iovec entry for process commandline on stack
  • core: include Found state in device dumps
  • device: fix serialization and deserialization of DeviceFound
  • fix path in btrfs rule (#6844)
  • assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
  • Update systemd-system.conf.xml (bsc#1122000)
  • units: inform user that the default target is started after exiting from rescue or emergency mode
  • manager: don't skip sigchld handler for main and control pid for services (#3738)
  • core: Add helper functions unit_{main, control}_pid
  • manager: Fixing a debug printf formatting mistake (#3640)
  • manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
  • core: update invoke_sigchld_event() to handle NULL ->sigchld_event()
  • sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
  • unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
  • core: when restarting services, don't close fds
  • cryptsetup: Add dependency on loopback setup to generated units
  • journal-gateway: use localStorage['cursor'] only when it has valid value
  • journal-gateway: explicitly declare local variables
  • analyze: actually select longest activated-time of services
  • sd-bus: fix implicit downcast of bitfield reported by LGTM
  • core: free lines after reading them (bsc#1123892)
  • pam_systemd: reword message about not creating a session (bsc#1111498)
  • pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
  • main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
  • sd-bus: if we receive an invalid dbus message, ignore and proceeed
  • automount: don't pass non-blocking pipe to kernel.
  • units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
  • units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Список пакетов

openSUSE Leap 42.3
libsystemd0-228-68.1
libsystemd0-32bit-228-68.1
libsystemd0-mini-228-68.1
libudev-devel-228-68.1
libudev-mini-devel-228-68.1
libudev-mini1-228-68.1
libudev1-228-68.1
libudev1-32bit-228-68.1
nss-myhostname-228-68.1
nss-myhostname-32bit-228-68.1
nss-mymachines-228-68.1
systemd-228-68.1
systemd-32bit-228-68.1
systemd-bash-completion-228-68.1
systemd-devel-228-68.1
systemd-logger-228-68.1
systemd-mini-228-68.1
systemd-mini-bash-completion-228-68.1
systemd-mini-devel-228-68.1
systemd-mini-sysvinit-228-68.1
systemd-sysvinit-228-68.1
udev-228-68.1
udev-mini-228-68.1

Описание

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).


Затронутые продукты
openSUSE Leap 42.3:libsystemd0-228-68.1
openSUSE Leap 42.3:libsystemd0-32bit-228-68.1
openSUSE Leap 42.3:libsystemd0-mini-228-68.1
openSUSE Leap 42.3:libudev-devel-228-68.1

Ссылки