drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in systemd
Name: |
Denial of Service in systemd |
|
ID: |
SUSE-SU-2020:1828-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP5 |
|
Datum: |
Fr, 3. Juli 2020, 06:46 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 |
|
Applikationen: |
systemd |
|
Originalnachricht |
SUSE Security Update: Security update for systemd ______________________________________________________________________________
Announcement ID: SUSE-SU-2020:1828-1 Rating: moderate References: #1084671 #1154256 #1157315 #1161262 #1161436 #1162698 #1164538 #1165633 #1167622 #1171145 Cross-References: CVE-2019-20386 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________
An update that solves one vulnerability and has 9 fixes is now available.
Description:
This update for systemd fixes the following issues:
- CVE-2019-20386: Fixed a memory leak when executing the udevadm trigger command (bsc#1161436). - Renamed the persistent link for ATA devices (bsc#1164538) - shared/install: try harder to find enablement symlinks when disabling a unit (bsc#1157315) - tmpfiles: removed unnecessary assert (bsc#1171145) - pid1: by default make user units inherit their umask from the user manager (bsc#1162698) - manager: fixed job mode when signalled to shutdown etc (bsc#1161262) - coredump: fixed bug that loses core dump files when core dumps are compressed and disk space is low. (bsc#1167622) - udev: inform systemd how many workers we can potentially spawn (#4036) (bsc#1165633) - libblkid: open device in nonblock mode. (bsc#1084671) - udev/cdrom_id: Do not open CD-rom in exclusive mode. (bsc#1154256)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-1828=1
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-1828=1
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
libudev-devel-228-157.12.5 systemd-debuginfo-228-157.12.5 systemd-debugsource-228-157.12.5 systemd-devel-228-157.12.5
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
libsystemd0-228-157.12.5 libsystemd0-debuginfo-228-157.12.5 libudev-devel-228-157.12.5 libudev1-228-157.12.5 libudev1-debuginfo-228-157.12.5 systemd-228-157.12.5 systemd-debuginfo-228-157.12.5 systemd-debugsource-228-157.12.5 systemd-devel-228-157.12.5 systemd-sysvinit-228-157.12.5 udev-228-157.12.5 udev-debuginfo-228-157.12.5
- SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
libsystemd0-32bit-228-157.12.5 libsystemd0-debuginfo-32bit-228-157.12.5 libudev1-32bit-228-157.12.5 libudev1-debuginfo-32bit-228-157.12.5 systemd-32bit-228-157.12.5 systemd-debuginfo-32bit-228-157.12.5
- SUSE Linux Enterprise Server 12-SP5 (noarch):
systemd-bash-completion-228-157.12.5
References:
https://www.suse.com/security/cve/CVE-2019-20386.html https://bugzilla.suse.com/1084671 https://bugzilla.suse.com/1154256 https://bugzilla.suse.com/1157315 https://bugzilla.suse.com/1161262 https://bugzilla.suse.com/1161436 https://bugzilla.suse.com/1162698 https://bugzilla.suse.com/1164538 https://bugzilla.suse.com/1165633 https://bugzilla.suse.com/1167622 https://bugzilla.suse.com/1171145
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|