Security update for systemd

Announcement ID: SUSE-SU-2019:0137-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2018-16864 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2018-16864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16864 ( NVD ): 7.4 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16865 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-16865 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16865 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-16866 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-16866 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-16866 ( NVD ): 4.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-6954 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-6954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-6954 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • Basesystem Module 15
  • SUSE Linux Enterprise Desktop 15
  • SUSE Linux Enterprise High Performance Computing 15
  • SUSE Linux Enterprise Server 15
  • SUSE Linux Enterprise Server for SAP Applications 15

An update that solves four vulnerabilities and has seven security fixes can now be installed.

Description:

This update for systemd provides the following fixes:

Security issues fixed:

  • CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
  • CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
  • CVE-2018-6954: Fix mishandling of symlinks present in non-terminal path components (bsc#1080919)
  • Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

  • pam_systemd: Fix 'Cannot create session: Already running in a session' (bsc#1111498)
  • systemd-vconsole-setup: vconsole setup fails, fonts will not be copied to tty (bsc#1114933)
  • systemd-tmpfiles-setup: symlinked /tmp to /var/tmp breaking multiple units (bsc#1045723)
  • Fixed installation issue with /etc/machine-id during update (bsc#1117063)
  • btrfs: qgroups are assigned to parent qgroups after reboot (bsc#1093753)
  • logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
  • udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
  • udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to detect non-zvm environment. The systemd-detect-virt returns exit failure code when it detected none state. The exit failure code causes that the hot-add memory block can not be set to online. (bsc#1076696)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Basesystem Module 15
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-137=1

Package List:

  • Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
    • systemd-devel-234-24.20.1
    • systemd-container-234-24.20.1
    • udev-234-24.20.1
    • udev-debuginfo-234-24.20.1
    • systemd-container-debuginfo-234-24.20.1
    • libudev1-debuginfo-234-24.20.1
    • systemd-coredump-234-24.20.1
    • systemd-234-24.20.1
    • systemd-debuginfo-234-24.20.1
    • libudev1-234-24.20.1
    • libsystemd0-234-24.20.1
    • systemd-debugsource-234-24.20.1
    • libudev-devel-234-24.20.1
    • systemd-coredump-debuginfo-234-24.20.1
    • systemd-sysvinit-234-24.20.1
    • libsystemd0-debuginfo-234-24.20.1
  • Basesystem Module 15 (noarch)
    • systemd-bash-completion-234-24.20.1
  • Basesystem Module 15 (x86_64)
    • libsystemd0-32bit-234-24.20.1
    • systemd-32bit-234-24.20.1
    • libsystemd0-32bit-debuginfo-234-24.20.1
    • libudev1-32bit-debuginfo-234-24.20.1
    • libudev1-32bit-234-24.20.1
    • systemd-32bit-debuginfo-234-24.20.1

References: