drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in systemd
Name: |
Zwei Probleme in systemd |
|
ID: |
SUSE-SU-2018:3767-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE OpenStack Cloud Magnum Orchestration 7, SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Enterprise Storage 4, SUSE CaaS Platform ALL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12-SP2-BCL |
|
Datum: |
Mi, 14. November 2018, 18:45 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688 |
|
Applikationen: |
systemd |
|
Originalnachricht |
SUSE Security Update: Security update for systemd ______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3767-1 Rating: important References: #1106923 #1108835 #1109252 #1110445 #1111278 #1112024 #1113083 #1113632 #1113665 Cross-References: CVE-2018-15686 CVE-2018-15688 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Desktop 12-SP3 SUSE Enterprise Storage 4 SUSE CaaS Platform ALL SUSE CaaS Platform 3.0 OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________
An update that solves two vulnerabilities and has 7 fixes is now available.
Description:
This update for systemd fixes the following issues:
Security issues fixed:
- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632) - CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)
Non-security issues fixed:
- dhcp6: split assert_return() to be more debuggable when hit - core: skip unit deserialization and move to the next one when unit_deserialize() fails - core: properly handle deserialization of unknown unit types (#6476) - core: don't create Requires for workdir if "missing ok" (bsc#1113083) - logind: use manager_get_user_by_pid() where appropriate - logind: rework manager_get_{user|session}_by_pid() a bit - login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024) - core: be more defensive if we can't determine per-connection socket peer (#7329) - socket-util: introduce port argument in sockaddr_port() - service: fixup ExecStop for socket-activated shutdown (#4120) - service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923) - cryptsetup: build fixes for "add support for sector-size= option" - udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278) - core: keep the kernel coredump defaults when systemd-coredump is disabled - core: shorten main() a bit, split out coredump initialization - core: set RLIMIT_CORE to unlimited by default (bsc#1108835) - core/mount: fstype may be NULL - journald: don't ship systemd-journald-audit.socket (bsc#1109252) - core: make "tmpfs" dependencies on swapfs a "default" dep, not an "implicit" (bsc#1110445) - mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076) - tmp.mount.hm4: After swap.target (#3087)
- Ship systemd-sysv-install helper via the main package This script was part of systemd-sysvinit sub-package but it was wrong since systemd-sysv-install is a script used to redirect enable/disable operations to chkconfig when the unit targets are sysv init scripts. Therefore it's never been a SySV init tool.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 7:
zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2659=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2659=1
- SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2659=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2659=1
- SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2659=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2659=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2659=1
- SUSE Enterprise Storage 4:
zypper in -t patch SUSE-Storage-4-2018-2659=1
- SUSE CaaS Platform ALL:
To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
- SUSE CaaS Platform 3.0:
To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2659=1
Package List:
- SUSE OpenStack Cloud 7 (s390x x86_64):
libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE OpenStack Cloud 7 (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
libudev-devel-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-devel-228-150.53.3
- SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Linux Enterprise Server for SAP 12-SP2 (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):
libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3
- SUSE Linux Enterprise Server 12-SP3 (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Linux Enterprise Server 12-SP2-LTSS (s390x x86_64):
libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3
- SUSE Linux Enterprise Server 12-SP2-LTSS (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Linux Enterprise Desktop 12-SP3 (noarch):
systemd-bash-completion-228-150.53.3
- SUSE Enterprise Storage 4 (x86_64):
libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE Enterprise Storage 4 (noarch):
systemd-bash-completion-228-150.53.3
- SUSE CaaS Platform ALL (x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- SUSE CaaS Platform 3.0 (x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3
References:
https://www.suse.com/security/cve/CVE-2018-15686.html https://www.suse.com/security/cve/CVE-2018-15688.html https://bugzilla.suse.com/1106923 https://bugzilla.suse.com/1108835 https://bugzilla.suse.com/1109252 https://bugzilla.suse.com/1110445 https://bugzilla.suse.com/1111278 https://bugzilla.suse.com/1112024 https://bugzilla.suse.com/1113083 https://bugzilla.suse.com/1113632 https://bugzilla.suse.com/1113665
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|