Oval Definition:oval:org.opensuse.security:def:57965
Revision Date:2021-07-21Version:1
Title:Security update for systemd (Important)
Description:

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545) - mount-util: do not use the official MAX_HANDLE_SZ (#7523) - mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761) - mount-util: fix bad indenting - mount-util: EOVERFLOW might have other causes than buffer size issues - mount-util: fix error propagation in fd_fdinfo_mnt_id() - mount-util: drop exponential buffer growing in name_to_handle_at_loop() - udev: port udev_has_devtmpfs() to use path_get_mnt_id() - mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path - mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at() - mount-util: accept that name_to_handle_at() might fail with EPERM (#5499) - basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo - sysusers: use the usual comment style - test/TEST-21-SYSUSERS: add tests for new functionality - sysusers: allow admin/runtime overrides to command-line config - basic/strv: add function to insert items at position - sysusers: allow the shell to be specified - sysusers: move various user credential validity checks to src/basic/ - man: reformat table in sysusers.d(5) - sysusers: take configuration as positional arguments - sysusers: emit a bit more info at debug level when locking fails - sysusers: allow force reusing existing user/group IDs (#8037) - sysusers: ensure GID in uid:gid syntax exists - sysusers: make ADD_GROUP always create a group - test: add TEST-21-SYSUSERS test - sysuser: use OrderedHashmap - sysusers: allow uid:gid in sysusers.conf files - sysusers: fix memleak (#4430) - These commits implement the option '--replace' for systemd-sysusers so %sysusers_create_package can be introduced in SLE and packages can rely on this rpm macro without wondering whether the macro is available on the different target the package is submitted to. - Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807) - systemctl: add --value option - execute: make sure to call into PAM after initializing resource limits (bsc#1184967) - rlimit-util: introduce setrlimit_closest_all() - system-conf: drop reference to ShutdownWatchdogUsec= - core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331) - Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046) - rules: don't ignore Xen virtual interfaces anymore (bsc#1178561) - write_net_rules: set execute bits (bsc#1178561) - udev: rework network device renaming - Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
Family:unixClass:patch
Status:Reference(s):1015119
1029907
1029908
1029909
1030296
1030297
1030298
1030584
1030585
1030588
1030589
1031590
1031593
1031595
1031638
1031644
1031656
1033447
1033448
1037052
1037057
1037061
1037066
1037273
1044891
1044897
1044901
1044909
1044925
1044927
1065643
1065689
1065693
1068640
1068643
1068664
1068887
1068888
1068950
1069176
1069202
1074741
1077745
1079103
1079741
1080556
1081527
1081925
1083528
1083532
1085449
1085784
1086608
1086774
1086775
1086784
1086786
1086788
1086813
1086814
1086817
1086820
1087066
1087200
1090023
1090024
1090025
1090026
1090027
1090028
1090029
1090030
1090032
1090033
1090997
1091015
1091365
1091368
1093311
1093414
1104129
1109412
1109413
1109414
1109465
1111996
1112534
1112535
1113247
1113252
1113255
1116827
1117473
1118830
1118831
1120640
1121034
1121035
1121056
1123156
1123482
1124525
1126068
1126069
1133131
1133185
1133232
1133810
1135902
1139073
1140402
1140868
1141035
1141913
1142772
1143794
1145665
1146873
1149323
1149811
1150734
1154043
1155988
1157198
1157763
1159208
1159623
1161066
1163018
1166240
1170940
1178561
1184761
1184967
1185046
1185331
1185807
1188063
CVE-2011-3177
CVE-2012-0876
CVE-2014-9939
CVE-2014-9939
CVE-2016-0718
CVE-2016-4472
CVE-2016-8745
CVE-2016-9063
CVE-2017-1000158
CVE-2017-15710
CVE-2017-15715
CVE-2017-15938
CVE-2017-15938
CVE-2017-15939
CVE-2017-15939
CVE-2017-15996
CVE-2017-15996
CVE-2017-16826
CVE-2017-16826
CVE-2017-16827
CVE-2017-16827
CVE-2017-16828
CVE-2017-16828
CVE-2017-16829
CVE-2017-16829
CVE-2017-16830
CVE-2017-16830
CVE-2017-16831
CVE-2017-16831
CVE-2017-16832
CVE-2017-16832
CVE-2017-5647
CVE-2017-5648
CVE-2017-6965
CVE-2017-6965
CVE-2017-6966
CVE-2017-6966
CVE-2017-6969
CVE-2017-6969
CVE-2017-7209
CVE-2017-7209
CVE-2017-7210
CVE-2017-7210
CVE-2017-7223
CVE-2017-7223
CVE-2017-7224
CVE-2017-7224
CVE-2017-7225
CVE-2017-7225
CVE-2017-7226
CVE-2017-7226
CVE-2017-7299
CVE-2017-7299
CVE-2017-7300
CVE-2017-7300
CVE-2017-7301
CVE-2017-7301
CVE-2017-7302
CVE-2017-7302
CVE-2017-7303
CVE-2017-7303
CVE-2017-7304
CVE-2017-7304
CVE-2017-8392
CVE-2017-8392
CVE-2017-8393
CVE-2017-8393
CVE-2017-8394
CVE-2017-8394
CVE-2017-8396
CVE-2017-8396
CVE-2017-8421
CVE-2017-8421
CVE-2017-9233
CVE-2017-9746
CVE-2017-9746
CVE-2017-9747
CVE-2017-9747
CVE-2017-9748
CVE-2017-9748
CVE-2017-9750
CVE-2017-9750
CVE-2017-9755
CVE-2017-9755
CVE-2017-9756
CVE-2017-9756
CVE-2018-1000876
CVE-2018-10372
CVE-2018-10372
CVE-2018-10373
CVE-2018-10373
CVE-2018-10534
CVE-2018-10534
CVE-2018-10535
CVE-2018-10535
CVE-2018-1058
CVE-2018-1283
CVE-2018-1301
CVE-2018-1302
CVE-2018-1303
CVE-2018-1312
CVE-2018-1417
CVE-2018-17358
CVE-2018-17359
CVE-2018-17360
CVE-2018-17985
CVE-2018-18309
CVE-2018-18483
CVE-2018-18484
CVE-2018-18605
CVE-2018-18606
CVE-2018-18607
CVE-2018-19931
CVE-2018-19932
CVE-2018-20623
CVE-2018-20651
CVE-2018-20671
CVE-2018-2783
CVE-2018-2790
CVE-2018-2790
CVE-2018-2794
CVE-2018-2794
CVE-2018-2795
CVE-2018-2795
CVE-2018-2796
CVE-2018-2796
CVE-2018-2797
CVE-2018-2797
CVE-2018-2798
CVE-2018-2798
CVE-2018-2799
CVE-2018-2799
CVE-2018-2800
CVE-2018-2800
CVE-2018-2814
CVE-2018-2814
CVE-2018-2815
CVE-2018-2825
CVE-2018-2826
CVE-2018-5740
CVE-2018-5743
CVE-2018-5745
CVE-2018-6323
CVE-2018-6323
CVE-2018-6543
CVE-2018-6543
CVE-2018-6759
CVE-2018-6759
CVE-2018-6872
CVE-2018-6872
CVE-2018-7208
CVE-2018-7208
CVE-2018-7568
CVE-2018-7568
CVE-2018-7569
CVE-2018-7569
CVE-2018-7570
CVE-2018-7570
CVE-2018-7642
CVE-2018-7642
CVE-2018-7643
CVE-2018-7643
CVE-2018-8945
CVE-2018-8945
CVE-2019-1010180
CVE-2019-11135
CVE-2019-11139
CVE-2019-11709
CVE-2019-11710
CVE-2019-11711
CVE-2019-11712
CVE-2019-11713
CVE-2019-11714
CVE-2019-11715
CVE-2019-11716
CVE-2019-11717
CVE-2019-11718
CVE-2019-11719
CVE-2019-11720
CVE-2019-11721
CVE-2019-11723
CVE-2019-11724
CVE-2019-11725
CVE-2019-11727
CVE-2019-11728
CVE-2019-11729
CVE-2019-11730
CVE-2019-11733
CVE-2019-11735
CVE-2019-11736
CVE-2019-11738
CVE-2019-11740
CVE-2019-11742
CVE-2019-11743
CVE-2019-11744
CVE-2019-11746
CVE-2019-11747
CVE-2019-11748
CVE-2019-11749
CVE-2019-11750
CVE-2019-11751
CVE-2019-11752
CVE-2019-11753
CVE-2019-12068
CVE-2019-12155
CVE-2019-13164
CVE-2019-14378
CVE-2019-15890
CVE-2019-15961
CVE-2019-3688
CVE-2019-3690
CVE-2019-6465
CVE-2019-6778
CVE-2019-9811
CVE-2019-9812
CVE-2020-1711
CVE-2020-1983
CVE-2020-7039
CVE-2020-8608
CVE-2021-33910
SUSE-SU-2017:1229-1
SUSE-SU-2018:0876-1
SUSE-SU-2018:1161-1
SUSE-SU-2018:1690-1
SUSE-SU-2018:1738-2
SUSE-SU-2018:3207-1
SUSE-SU-2019:2221-1
SUSE-SU-2019:2620-1
SUSE-SU-2019:2650-1
SUSE-SU-2019:2959-1
SUSE-SU-2019:3177-1
SUSE-SU-2019:3180-1
SUSE-SU-2020:0497-1
SUSE-SU-2020:1526-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 7
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • gimp-2.8.22-lp150.3 is installed
  • OR gimp-lang-2.8.22-lp150.3 is installed
  • OR gimp-plugins-python-2.8.22-lp150.3 is installed
  • OR libgimp-2_0-0-2.8.22-lp150.3 is installed
  • OR libgimpui-2_0-0-2.8.22-lp150.3 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • httpie-1.0.3-lp151.2.3 is installed
  • OR python3-httpie-1.0.3-lp151.2.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1-LTSS is installed
  • AND Package Information
  • qemu-2.3.1-33.26 is installed
  • OR qemu-block-curl-2.3.1-33.26 is installed
  • OR qemu-block-rbd-2.3.1-33.26 is installed
  • OR qemu-guest-agent-2.3.1-33.26 is installed
  • OR qemu-ipxe-1.0.0-33.26 is installed
  • OR qemu-kvm-2.3.1-33.26 is installed
  • OR qemu-lang-2.3.1-33.26 is installed
  • OR qemu-ppc-2.3.1-33.26 is installed
  • OR qemu-s390-2.3.1-33.26 is installed
  • OR qemu-seabios-1.8.1-33.26 is installed
  • OR qemu-sgabios-8-33.26 is installed
  • OR qemu-tools-2.3.1-33.26 is installed
  • OR qemu-vgabios-1.8.1-33.26 is installed
  • OR qemu-x86-2.3.1-33.26 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND yast2-3.1.206-37.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND Package Information
  • java-1_8_0-ibm-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33 is installed
  • OR java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • kgraft-patch-4_4_103-92_53-default-10-2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_16-10-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND binutils-2.31-9.26 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • krb5-1.12.5-39 is installed
  • OR krb5-32bit-1.12.5-39 is installed
  • OR krb5-client-1.12.5-39 is installed
  • OR krb5-doc-1.12.5-39 is installed
  • OR krb5-plugin-kdb-ldap-1.12.5-39 is installed
  • OR krb5-plugin-preauth-otp-1.12.5-39 is installed
  • OR krb5-plugin-preauth-pkinit-1.12.5-39 is installed
  • OR krb5-server-1.12.5-39 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • xen-4.9.4_06-3.59 is installed
  • OR xen-doc-html-4.9.4_06-3.59 is installed
  • OR xen-libs-4.9.4_06-3.59 is installed
  • OR xen-libs-32bit-4.9.4_06-3.59 is installed
  • OR xen-tools-4.9.4_06-3.59 is installed
  • OR xen-tools-domU-4.9.4_06-3.59 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND Package Information
  • libsystemd0-228-150.98.1 is installed
  • OR libsystemd0-32bit-228-150.98.1 is installed
  • OR libudev-devel-228-150.98.1 is installed
  • OR libudev1-228-150.98.1 is installed
  • OR libudev1-32bit-228-150.98.1 is installed
  • OR systemd-228-150.98.1 is installed
  • OR systemd-32bit-228-150.98.1 is installed
  • OR systemd-bash-completion-228-150.98.1 is installed
  • OR systemd-devel-228-150.98.1 is installed
  • OR systemd-sysvinit-228-150.98.1 is installed
  • OR udev-228-150.98.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • libvirt-3.3.0-5.40 is installed
  • OR libvirt-admin-3.3.0-5.40 is installed
  • OR libvirt-client-3.3.0-5.40 is installed
  • OR libvirt-daemon-3.3.0-5.40 is installed
  • OR libvirt-daemon-config-network-3.3.0-5.40 is installed
  • OR libvirt-daemon-config-nwfilter-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-interface-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-libxl-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-lxc-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-network-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-nodedev-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-nwfilter-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-qemu-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-secret-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-core-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-disk-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-iscsi-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-logical-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-mpath-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-rbd-3.3.0-5.40 is installed
  • OR libvirt-daemon-driver-storage-scsi-3.3.0-5.40 is installed
  • OR libvirt-daemon-hooks-3.3.0-5.40 is installed
  • OR libvirt-daemon-lxc-3.3.0-5.40 is installed
  • OR libvirt-daemon-qemu-3.3.0-5.40 is installed
  • OR libvirt-daemon-xen-3.3.0-5.40 is installed
  • OR libvirt-doc-3.3.0-5.40 is installed
  • OR libvirt-libs-3.3.0-5.40 is installed
  • OR libvirt-lock-sanlock-3.3.0-5.40 is installed
  • OR libvirt-nss-3.3.0-5.40 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • cups-filters-1.0.58-19.2 is installed
  • OR cups-filters-cups-browsed-1.0.58-19.2 is installed
  • OR cups-filters-foomatic-rip-1.0.58-19.2 is installed
  • OR cups-filters-ghostscript-1.0.58-19.2 is installed
  • OR libqpdf18-7.1.1-3.3 is installed
  • OR qpdf-7.1.1-3.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • libpango-1_0-0-1.40.1-9 is installed
  • OR libpango-1_0-0-32bit-1.40.1-9 is installed
  • OR typelib-1_0-Pango-1_0-1.40.1-9 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 7 is installed
  • AND binutils-2.31-9.26 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND Package Information
  • MozillaFirefox-60.9.0-109.86 is installed
  • OR MozillaFirefox-translations-common-60.9.0-109.86 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • ruby2.1-rubygem-haml-4.0.6-3.3 is installed
  • OR rubygem-haml-4.0.6-3.3 is installed
  • BACK