openSUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:1450-1 Rating: important References: #1080919 #1121563 #1125352 #1126056 #1127557 #1128657 #1130230 #1132348 #1132400 #1132721 #955942 Cross-References: CVE-2018-6954 CVE-2019-3842 CVE-2019-6454 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that solves three vulnerabilities and has 8 fixes is now available. Description: This update for systemd fixes the following issues: Security issues fixed: - CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles which allowed a local user to obtain ownership of arbitrary files (bsc#1080919). - CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348). - CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352). Non-security issues fixed: - systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933) - udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400) - sd-bus: bump message queue size again (bsc#1132721) - core: only watch processes when it's really necessary (bsc#955942 bsc#1128657) - rules: load drivers only on "add" events (bsc#1126056) - sysctl: Don't pass null directive argument to '%s' (bsc#1121563) - Do not automatically online memory on s390x (bsc#1127557) This update was imported from the SUSE:SLE-12-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2019-1450=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): libsystemd0-228-71.1 libsystemd0-debuginfo-228-71.1 libsystemd0-mini-228-71.1 libsystemd0-mini-debuginfo-228-71.1 libudev-devel-228-71.1 libudev-mini-devel-228-71.1 libudev-mini1-228-71.1 libudev-mini1-debuginfo-228-71.1 libudev1-228-71.1 libudev1-debuginfo-228-71.1 nss-myhostname-228-71.1 nss-myhostname-debuginfo-228-71.1 nss-mymachines-228-71.1 nss-mymachines-debuginfo-228-71.1 systemd-228-71.1 systemd-debuginfo-228-71.1 systemd-debugsource-228-71.1 systemd-devel-228-71.1 systemd-logger-228-71.1 systemd-mini-228-71.1 systemd-mini-debuginfo-228-71.1 systemd-mini-debugsource-228-71.1 systemd-mini-devel-228-71.1 systemd-mini-sysvinit-228-71.1 systemd-sysvinit-228-71.1 udev-228-71.1 udev-debuginfo-228-71.1 udev-mini-228-71.1 udev-mini-debuginfo-228-71.1 - openSUSE Leap 42.3 (noarch): systemd-bash-completion-228-71.1 systemd-mini-bash-completion-228-71.1 - openSUSE Leap 42.3 (x86_64): libsystemd0-32bit-228-71.1 libsystemd0-debuginfo-32bit-228-71.1 libudev1-32bit-228-71.1 libudev1-debuginfo-32bit-228-71.1 nss-myhostname-32bit-228-71.1 nss-myhostname-debuginfo-32bit-228-71.1 systemd-32bit-228-71.1 systemd-debuginfo-32bit-228-71.1 References: https://www.suse.com/security/cve/CVE-2018-6954.html https://www.suse.com/security/cve/CVE-2019-3842.html https://www.suse.com/security/cve/CVE-2019-6454.html https://bugzilla.suse.com/1080919 https://bugzilla.suse.com/1121563 https://bugzilla.suse.com/1125352 https://bugzilla.suse.com/1126056 https://bugzilla.suse.com/1127557 https://bugzilla.suse.com/1128657 https://bugzilla.suse.com/1130230 https://bugzilla.suse.com/1132348 https://bugzilla.suse.com/1132400 https://bugzilla.suse.com/1132721 https://bugzilla.suse.com/955942 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org