Security update for systemd

Announcement ID: SUSE-SU-2019:0054-2
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2018-15686 ( SUSE ): 3.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2018-15686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-15686 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16864 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2018-16864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16864 ( NVD ): 7.4 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16865 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-16865 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16865 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1

An update that solves three vulnerabilities and has one security fix can now be installed.

Description:

This update for systemd fixes the following issues:

  • Fix security vulnerabilities CVE-2018-16864 and CVE-2018-16865 (bsc#1120323): Both issues were memory corruptions via attacker-controlled alloca which could have been used to gain root privileges by a local attacker.

  • Fix security vulnerability CVE-2018-15686 (bsc#1113665): A vulnerability in unit_deserialize of systemd used to allow an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This could have been used to improperly influence systemd execution and possibly lead to root privilege escalation.

  • Remedy 2048 character line-length limit in systemd-sysctl code that would cause parser failures if /etc/sysctl.conf contained lines that exceeded this length (bsc#1071558).

  • Fix a bug in systemd's core timer code that would cause timer looping under certain conditions, resulting in hundreds of syslog messages being written to the journal (bsc#1068588).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
    zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-54=1

Package List:

  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
    • libudev1-debuginfo-32bit-210-116.19.1
    • udev-210-116.19.1
    • libgudev-1_0-0-210-116.19.1
    • systemd-debugsource-210-116.19.1
    • libgudev-1_0-0-debuginfo-32bit-210-116.19.1
    • libudev1-32bit-210-116.19.1
    • libudev1-debuginfo-210-116.19.1
    • systemd-32bit-210-116.19.1
    • typelib-1_0-GUdev-1_0-210-116.19.1
    • systemd-debuginfo-210-116.19.1
    • systemd-debuginfo-32bit-210-116.19.1
    • systemd-sysvinit-210-116.19.1
    • libgudev-1_0-0-32bit-210-116.19.1
    • libgudev-1_0-devel-210-116.19.1
    • systemd-devel-210-116.19.1
    • udev-debuginfo-210-116.19.1
    • libudev-devel-210-116.19.1
    • systemd-210-116.19.1
    • libudev1-210-116.19.1
    • libgudev-1_0-0-debuginfo-210-116.19.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (noarch)
    • systemd-bash-completion-210-116.19.1

References: