Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for systemd (Moderate) |
Description: |
This update for systemd fixes several issues.
This security issue was fixed:
- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).
These non-security issues were fixed:
- core: don't choke if a unit another unit triggers vanishes during reload - delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX - delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428) - delta: check if a prefix needs to be skipped only once - delta: skip symlink paths when split-usr is enabled (#4591) - sysctl: use raw file descriptor in sysctl_write (#7753) - sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254) - Fix the regexp used to detect broken by-id symlinks in /etc/crypttab It was missing the following case: '/dev/disk/by-id/cr_-xxx'. - sysctl: disable buffer while writing to /proc (bsc#1071558) - Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558) - sysctl: no need to check for eof twice - def: add new constant LONG_LINE_MAX - fileio: add new helper call read_line() as bounded getline() replacement - service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156) - gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280) - gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422) - fstab-util: introduce fstab_has_fstype() helper - fstab-generator: ignore root=/dev/nfs (#3591) - fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452) - virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510) - analyze: replace --no-man with --man=no in the man page (bsc#1068251) - udev: net_setup_link: don't error out when we couldn't apply link config (#7328) - Add missing /etc/systemd/network directory - Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510) - sd-bus: use -- when passing arguments to ssh (#6706) - systemctl: make sure we terminate the bus connection first, and then close the pager (#3550) - sd-bus: bump message queue size (bsc#1075724) - tmpfiles: downgrade warning about duplicate line
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1001203 1008846 1009085 1014437 1014441 1014442 1027519 1027575 1038564 1042892 1046191 1048510 1050751 1055047 1056336 1061075 1061081 1061086 1063123 1065276 1066156 1068187 1068191 1068251 1070428 1071558 1074254 1074562 1075724 1076308 1086039 1092631 1096254 1100408 1102682 1103203 1105323 1106222 1108382 1109137 1110910 1111006 1111010 1111013 1114422 1125330 1127155 1127987 1129821 1130262 1133190 1133738 1134395 1134701 1136922 1136935 1137194 1137597 1138291 1140575 1140747 1145092 897422 973786 975299 986675 991564 992534 994500 997833 CVE-2009-3939 CVE-2009-4026 CVE-2009-4027 CVE-2009-4131 CVE-2009-4138 CVE-2009-4536 CVE-2009-4538 CVE-2010-1146 CVE-2010-1436 CVE-2010-1641 CVE-2010-2066 CVE-2010-2942 CVE-2010-2954 CVE-2010-2955 CVE-2010-3081 CVE-2010-3296 CVE-2010-3297 CVE-2010-3298 CVE-2010-3301 CVE-2010-3310 CVE-2011-0712 CVE-2011-1020 CVE-2011-1577 CVE-2011-2203 CVE-2012-0056 CVE-2013-0160 CVE-2013-0231 CVE-2013-0913 CVE-2013-2850 CVE-2013-4312 CVE-2014-0038 CVE-2014-00691 CVE-2014-0196 CVE-2014-3589 CVE-2014-3598 CVE-2015-7833 CVE-2015-7884 CVE-2015-7885 CVE-2015-8709 CVE-2015-8812 CVE-2016-0617 CVE-2016-0723 CVE-2016-0728 CVE-2016-0758 CVE-2016-1237 CVE-2016-1583 CVE-2016-2123 CVE-2016-2125 CVE-2016-2126 CVE-2016-2143 CVE-2016-2184 CVE-2016-2185 CVE-2016-2186 CVE-2016-2188 CVE-2016-2383 CVE-2016-2384 CVE-2016-2847 CVE-2016-3076 CVE-2016-3134 CVE-2016-3135 CVE-2016-3136 CVE-2016-3137 CVE-2016-3138 CVE-2016-3140 CVE-2016-3156 CVE-2016-3672 CVE-2016-3689 CVE-2016-3713 CVE-2016-3951 CVE-2016-4470 CVE-2016-4482 CVE-2016-4486 CVE-2016-4557 CVE-2016-4558 CVE-2016-4569 CVE-2016-4578 CVE-2016-4794 CVE-2016-4805 CVE-2016-4951 CVE-2016-4997 CVE-2016-4998 CVE-2016-5195 CVE-2016-5244 CVE-2016-5384 CVE-2016-5412 CVE-2016-5696 CVE-2016-5828 CVE-2016-5829 CVE-2016-6197 CVE-2016-6480 CVE-2016-6828 CVE-2016-7039 CVE-2016-7097 CVE-2016-8658 CVE-2016-9190 CVE-2017-13672 CVE-2017-15289 CVE-2017-15592 CVE-2017-15595 CVE-2017-15597 CVE-2017-15908 CVE-2017-2636 CVE-2017-5715 CVE-2017-5753 CVE-2017-5754 CVE-2017-7533 CVE-2017-7645 CVE-2017-8890 CVE-2017-9242 CVE-2018-1049 CVE-2018-10839 CVE-2018-10902 CVE-2018-15746 CVE-2018-17958 CVE-2018-17962 CVE-2018-17963 CVE-2018-18335 CVE-2018-18356 CVE-2018-18506 CVE-2018-18849 CVE-2018-20836 CVE-2018-3639 CVE-2018-5390 CVE-2019-10126 CVE-2019-10208 CVE-2019-10638 CVE-2019-10639 CVE-2019-11477 CVE-2019-11478 CVE-2019-11487 CVE-2019-11599 CVE-2019-12380 CVE-2019-12456 CVE-2019-12614 CVE-2019-12818 CVE-2019-12819 CVE-2019-5785 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9794 CVE-2019-9795 CVE-2019-9796 CVE-2019-9801 CVE-2019-9810 CVE-2019-9813 SUSE-SU-2016:2190-1 SUSE-SU-2016:3272-1 SUSE-SU-2017:2072-1 SUSE-SU-2017:3236-1 SUSE-SU-2018:0299-1 SUSE-SU-2018:1191-1 SUSE-SU-2018:1699-1 SUSE-SU-2018:4129-1 SUSE-SU-2019:0852-1 SUSE-SU-2019:1823-1 SUSE-SU-2019:1924-1 SUSE-SU-2019:2158-1 SUSE-SU-2019:2159-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Desktop 12 SP3 SUSE Linux Enterprise Server 12 SP1 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 6 SUSE OpenStack Cloud 7 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
elfutils-0.168-lp150.2 is installed
OR elfutils-lang-0.168-lp150.2 is installed
OR libasm1-0.168-lp150.2 is installed
OR libdw1-0.168-lp150.2 is installed
OR libdw1-32bit-0.168-lp150.2 is installed
OR libebl-plugins-0.168-lp150.2 is installed
OR libebl-plugins-32bit-0.168-lp150.2 is installed
OR libelf1-0.168-lp150.2 is installed
OR libelf1-32bit-0.168-lp150.2 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
cron-4.2-lp151.4.3 is installed
OR cronie-1.5.1-lp151.4.3 is installed
OR cronie-anacron-1.5.1-lp151.4.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed
AND Package Information
libsystemd0-228-150.29 is installed
OR libsystemd0-32bit-228-150.29 is installed
OR libudev1-228-150.29 is installed
OR libudev1-32bit-228-150.29 is installed
OR systemd-228-150.29 is installed
OR systemd-32bit-228-150.29 is installed
OR systemd-bash-completion-228-150.29 is installed
OR systemd-sysvinit-228-150.29 is installed
OR udev-228-150.29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1 is installed
AND Package Information
fontconfig-2.11.0-6 is installed
OR fontconfig-32bit-2.11.0-6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
kgraft-patch-3_12_67-60_64_21-default-8-2 is installed
OR kgraft-patch-3_12_67-60_64_21-xen-8-2 is installed
OR kgraft-patch-SLE12-SP1_Update_10-8-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
kernel-default-4.4.21-69 is installed
OR kernel-default-base-4.4.21-69 is installed
OR kernel-default-devel-4.4.21-69 is installed
OR kernel-default-man-4.4.21-69 is installed
OR kernel-devel-4.4.21-69 is installed
OR kernel-macros-4.4.21-69 is installed
OR kernel-source-4.4.21-69 is installed
OR kernel-syms-4.4.21-69 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND clamav-0.100.2-33.18 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
libdcerpc-atsvc0-4.2.4-28.29 is installed
OR samba-4.2.4-28.29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
xen-4.7.5_04-43.33 is installed
OR xen-doc-html-4.7.5_04-43.33 is installed
OR xen-libs-4.7.5_04-43.33 is installed
OR xen-libs-32bit-4.7.5_04-43.33 is installed
OR xen-tools-4.7.5_04-43.33 is installed
OR xen-tools-domU-4.7.5_04-43.33 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
cpio-2.11-35 is installed
OR cpio-lang-2.11-35 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
ghostscript-9.52-23.34 is installed
OR ghostscript-x11-9.52-23.34 is installed
OR libspectre-0.2.7-12.10 is installed
OR libspectre1-0.2.7-12.10 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
kgraft-patch-4_4_178-94_91-default-6-2 is installed
OR kgraft-patch-SLE12-SP3_Update_25-6-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
at-3.1.14-8.6 is installed
OR flex-2.5.37-8 is installed
OR flex-32bit-2.5.37-8 is installed
OR libQtWebKit4-4.8.7+2.3.4-4.7 is installed
OR libQtWebKit4-32bit-4.8.7+2.3.4-4.7 is installed
OR libbonobo-2.32.1-16 is installed
OR libbonobo-32bit-2.32.1-16 is installed
OR libbonobo-doc-2.32.1-16 is installed
OR libbonobo-lang-2.32.1-16 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 6 is installed
AND python-Pillow-2.7.0-1 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 7 is installed
AND Package Information
xen-4.7.5_04-43.33 is installed
OR xen-doc-html-4.7.5_04-43.33 is installed
OR xen-libs-4.7.5_04-43.33 is installed
OR xen-libs-32bit-4.7.5_04-43.33 is installed
OR xen-tools-4.7.5_04-43.33 is installed
OR xen-tools-domU-4.7.5_04-43.33 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
ruby2.1-rubygem-loofah-2.0.2-3.8 is installed
OR rubygem-loofah-2.0.2-3.8 is installed
|