Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3569.3 SUSE Security Update: Security update for systemd 22 January 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: systemd Publisher: SUSE Operating System: SUSE Impact/Access: Root Compromise -- Remote/Unauthenticated Modify Permissions -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-16866 CVE-2018-16865 CVE-2018-16864 CVE-2018-15688 CVE-2018-15686 CVE-2018-6954 Reference: ESB-2018.3507 ESB-2018.3466 ESB-2018.3465 Original Bulletin: http://suse.com/support/update/announcement/2018/suse-su-20183767-1/ https://www.suse.com/support/update/announcement/2019/suse-su-20190137-1/ https://www.suse.com/support/update/announcement/2019/suse-su-20190135-1/ http://suse.com/support/update/announcement/2018/suse-su-20183767-2/ Comment: This bulletin contains four (4) SUSE security advisories. Revision History: January 22 2019: Added SUSE-SU-2019:0137-1 and SUSE-SU-2019:0135-1 December 11 2018: Added SUSE-SU-2018:3767-2 November 15 2018: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0137-1 Rating: important References: #1005023 #1045723 #1076696 #1080919 #1093753 #1101591 #1111498 #1114933 #1117063 #1119971 #1120323 Cross-References: CVE-2018-16864 CVE-2018-16865 CVE-2018-16866 CVE-2018-6954 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SUSE Linux Enterprise Module for Basesystem 15 ______________________________________________________________________________ An update that solves four vulnerabilities and has 7 fixes is now available. Description: This update for systemd provides the following fixes: Security issues fixed: - CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323) - CVE-2018-16866: Fixed an information leak in journald (bsc#1120323) - CVE-2018-6954: Fix mishandling of symlinks present in non-terminal path components (bsc#1080919) - Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971) Non-security issues fixed: - pam_systemd: Fix 'Cannot create session: Already running in a session' (bsc#1111498) - systemd-vconsole-setup: vconsole setup fails, fonts will not be copied to tty (bsc#1114933) - systemd-tmpfiles-setup: symlinked /tmp to /var/tmp breaking multiple units (bsc#1045723) - Fixed installation issue with /etc/machine-id during update (bsc#1117063) - btrfs: qgroups are assigned to parent qgroups after reboot (bsc#1093753) - logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591) - udev: Downgrade message when settting inotify watch up fails. (bsc#1005023) - udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to detect non-zvm environment. The systemd-detect-virt returns exit failure code when it detected _none_ state. The exit failure code causes that the hot-add memory block can not be set to online. (bsc#1076696) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-137=1 - SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-137=1 Package List: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64): libsystemd0-mini-234-24.20.1 libsystemd0-mini-debuginfo-234-24.20.1 libudev-mini-devel-234-24.20.1 libudev-mini1-234-24.20.1 libudev-mini1-debuginfo-234-24.20.1 nss-myhostname-234-24.20.1 nss-myhostname-debuginfo-234-24.20.1 nss-mymachines-234-24.20.1 nss-mymachines-debuginfo-234-24.20.1 nss-systemd-234-24.20.1 nss-systemd-debuginfo-234-24.20.1 systemd-debuginfo-234-24.20.1 systemd-debugsource-234-24.20.1 systemd-logger-234-24.20.1 systemd-mini-234-24.20.1 systemd-mini-container-mini-234-24.20.1 systemd-mini-container-mini-debuginfo-234-24.20.1 systemd-mini-coredump-mini-234-24.20.1 systemd-mini-coredump-mini-debuginfo-234-24.20.1 systemd-mini-debuginfo-234-24.20.1 systemd-mini-debugsource-234-24.20.1 systemd-mini-devel-234-24.20.1 systemd-mini-sysvinit-234-24.20.1 udev-mini-234-24.20.1 udev-mini-debuginfo-234-24.20.1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch): systemd-mini-bash-completion-234-24.20.1 - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): libsystemd0-234-24.20.1 libsystemd0-debuginfo-234-24.20.1 libudev-devel-234-24.20.1 libudev1-234-24.20.1 libudev1-debuginfo-234-24.20.1 systemd-234-24.20.1 systemd-container-234-24.20.1 systemd-container-debuginfo-234-24.20.1 systemd-coredump-234-24.20.1 systemd-coredump-debuginfo-234-24.20.1 systemd-debuginfo-234-24.20.1 systemd-debugsource-234-24.20.1 systemd-devel-234-24.20.1 systemd-sysvinit-234-24.20.1 udev-234-24.20.1 udev-debuginfo-234-24.20.1 - SUSE Linux Enterprise Module for Basesystem 15 (noarch): systemd-bash-completion-234-24.20.1 - SUSE Linux Enterprise Module for Basesystem 15 (x86_64): libsystemd0-32bit-234-24.20.1 libsystemd0-32bit-debuginfo-234-24.20.1 libudev1-32bit-234-24.20.1 libudev1-32bit-debuginfo-234-24.20.1 systemd-32bit-234-24.20.1 systemd-32bit-debuginfo-234-24.20.1 References: https://www.suse.com/security/cve/CVE-2018-16864.html https://www.suse.com/security/cve/CVE-2018-16865.html https://www.suse.com/security/cve/CVE-2018-16866.html https://www.suse.com/security/cve/CVE-2018-6954.html https://bugzilla.suse.com/1005023 https://bugzilla.suse.com/1045723 https://bugzilla.suse.com/1076696 https://bugzilla.suse.com/1080919 https://bugzilla.suse.com/1093753 https://bugzilla.suse.com/1101591 https://bugzilla.suse.com/1111498 https://bugzilla.suse.com/1114933 https://bugzilla.suse.com/1117063 https://bugzilla.suse.com/1119971 https://bugzilla.suse.com/1120323 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0135-1 Rating: moderate References: #1005023 #1076696 #1101591 #1114981 #1115518 #1119971 #1120323 Cross-References: CVE-2018-16864 CVE-2018-16865 CVE-2018-16866 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Desktop 12-SP4 SUSE Linux Enterprise Desktop 12-SP3 SUSE Enterprise Storage 4 SUSE CaaS Platform ALL SUSE CaaS Platform 3.0 OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________ An update that solves three vulnerabilities and has four fixes is now available. Description: This update for systemd provides the following fixes: Security issues fixed: - CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323) - CVE-2018-16866: Fixed an information leak in journald (bsc#1120323) - Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971) Non-security issues fixed: - core: Queue loading transient units after setting their properties. (bsc#1115518) - logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591) - terminal-util: introduce vt_release() and vt_restore() helpers. - terminal: Unify code for resetting kbd utf8 mode a bit. - terminal Reset should honour default_utf8 kernel setting. - logind: Make session_restore_vt() static. - udev: Downgrade message when settting inotify watch up fails. (bsc#1005023) - log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981) - udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to detect non-zvm environment. The systemd-detect-virt returns exit failure code when it detected _none_ state. The exit failure code causes that the hot-add memory block can not be set to online. (bsc#1076696) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2019-135=1 - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-135=1 - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-135=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-135=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-135=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-135=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-135=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-135=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-135=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-135=1 - SUSE Enterprise Storage 4: zypper in -t patch SUSE-Storage-4-2019-135=1 - SUSE CaaS Platform ALL: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. - OpenStack Cloud Magnum Orchestration 7: zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-135=1 Package List: - SUSE OpenStack Cloud 7 (s390x x86_64): libsystemd0-228-150.58.1 libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE OpenStack Cloud 7 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): libudev-devel-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-devel-228-150.58.1 - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): libudev-devel-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-devel-228-150.58.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64): libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64): libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 - SUSE Linux Enterprise Server 12-SP4 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64): libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 - SUSE Linux Enterprise Server 12-SP3 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (s390x x86_64): libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libsystemd0-228-150.58.1 libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): libsystemd0-228-150.58.1 libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Desktop 12-SP4 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): libsystemd0-228-150.58.1 libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE Linux Enterprise Desktop 12-SP3 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Enterprise Storage 4 (noarch): systemd-bash-completion-228-150.58.1 - SUSE Enterprise Storage 4 (x86_64): libsystemd0-228-150.58.1 libsystemd0-32bit-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libsystemd0-debuginfo-32bit-228-150.58.1 libudev1-228-150.58.1 libudev1-32bit-228-150.58.1 libudev1-debuginfo-228-150.58.1 libudev1-debuginfo-32bit-228-150.58.1 systemd-228-150.58.1 systemd-32bit-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debuginfo-32bit-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE CaaS Platform ALL (x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - SUSE CaaS Platform 3.0 (x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 - OpenStack Cloud Magnum Orchestration 7 (x86_64): libsystemd0-228-150.58.1 libsystemd0-debuginfo-228-150.58.1 libudev1-228-150.58.1 libudev1-debuginfo-228-150.58.1 systemd-228-150.58.1 systemd-debuginfo-228-150.58.1 systemd-debugsource-228-150.58.1 systemd-sysvinit-228-150.58.1 udev-228-150.58.1 udev-debuginfo-228-150.58.1 References: https://www.suse.com/security/cve/CVE-2018-16864.html https://www.suse.com/security/cve/CVE-2018-16865.html https://www.suse.com/security/cve/CVE-2018-16866.html https://bugzilla.suse.com/1005023 https://bugzilla.suse.com/1076696 https://bugzilla.suse.com/1101591 https://bugzilla.suse.com/1114981 https://bugzilla.suse.com/1115518 https://bugzilla.suse.com/1119971 https://bugzilla.suse.com/1120323 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:3767-1 Rating: important References: #1106923 #1108835 #1109252 #1110445 #1111278 #1112024 #1113083 #1113632 #1113665 Cross-References: CVE-2018-15686 CVE-2018-15688 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Desktop 12-SP3 SUSE Enterprise Storage 4 SUSE CaaS Platform ALL SUSE CaaS Platform 3.0 OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________ An update that solves two vulnerabilities and has 7 fixes is now available. Description: This update for systemd fixes the following issues: Security issues fixed: - CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632) - CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665) Non-security issues fixed: - dhcp6: split assert_return() to be more debuggable when hit - core: skip unit deserialization and move to the next one when unit_deserialize() fails - core: properly handle deserialization of unknown unit types (#6476) - core: don't create Requires for workdir if "missing ok" (bsc#1113083) - logind: use manager_get_user_by_pid() where appropriate - logind: rework manager_get_{user|session}_by_pid() a bit - login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024) - core: be more defensive if we can't determine per-connection socket peer (#7329) - socket-util: introduce port argument in sockaddr_port() - service: fixup ExecStop for socket-activated shutdown (#4120) - service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923) - cryptsetup: build fixes for "add support for sector-size= option" - udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278) - core: keep the kernel coredump defaults when systemd-coredump is disabled - core: shorten main() a bit, split out coredump initialization - core: set RLIMIT_CORE to unlimited by default (bsc#1108835) - core/mount: fstype may be NULL - journald: don't ship systemd-journald-audit.socket (bsc#1109252) - core: make "tmpfs" dependencies on swapfs a "default" dep, not an "implicit" (bsc#1110445) - mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076) - tmp.mount.hm4: After swap.target (#3087) - Ship systemd-sysv-install helper via the main package This script was part of systemd-sysvinit sub-package but it was wrong since systemd-sysv-install is a script used to redirect enable/disable operations to chkconfig when the unit targets are sysv init scripts. Therefore it's never been a SySV init tool. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2659=1 - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2659=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2659=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2659=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2659=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2659=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2659=1 - SUSE Enterprise Storage 4: zypper in -t patch SUSE-Storage-4-2018-2659=1 - SUSE CaaS Platform ALL: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. - OpenStack Cloud Magnum Orchestration 7: zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2659=1 Package List: - SUSE OpenStack Cloud 7 (s390x x86_64): libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE OpenStack Cloud 7 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): libudev-devel-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-devel-228-150.53.3 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Server for SAP 12-SP2 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64): libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64): libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 - SUSE Linux Enterprise Server 12-SP3 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Server 12-SP2-LTSS (s390x x86_64): libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 - SUSE Linux Enterprise Server 12-SP2-LTSS (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Desktop 12-SP3 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Enterprise Storage 4 (x86_64): libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Enterprise Storage 4 (noarch): systemd-bash-completion-228-150.53.3 - SUSE CaaS Platform ALL (x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE CaaS Platform 3.0 (x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - OpenStack Cloud Magnum Orchestration 7 (x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 References: https://www.suse.com/security/cve/CVE-2018-15686.html https://www.suse.com/security/cve/CVE-2018-15688.html https://bugzilla.suse.com/1106923 https://bugzilla.suse.com/1108835 https://bugzilla.suse.com/1109252 https://bugzilla.suse.com/1110445 https://bugzilla.suse.com/1111278 https://bugzilla.suse.com/1112024 https://bugzilla.suse.com/1113083 https://bugzilla.suse.com/1113632 https://bugzilla.suse.com/1113665 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:3767-2 Rating: important References: #1106923 #1108835 #1109252 #1110445 #1111278 #1112024 #1113083 #1113632 #1113665 Cross-References: CVE-2018-15686 CVE-2018-15688 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Desktop 12-SP4 ______________________________________________________________________________ An update that solves two vulnerabilities and has 7 fixes is now available. Description: This update for systemd fixes the following issues: Security issues fixed: - CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632) - CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665) Non-security issues fixed: - dhcp6: split assert_return() to be more debuggable when hit - core: skip unit deserialization and move to the next one when unit_deserialize() fails - core: properly handle deserialization of unknown unit types (#6476) - core: don't create Requires for workdir if "missing ok" (bsc#1113083) - logind: use manager_get_user_by_pid() where appropriate - logind: rework manager_get_{user|session}_by_pid() a bit - login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024) - core: be more defensive if we can't determine per-connection socket peer (#7329) - socket-util: introduce port argument in sockaddr_port() - service: fixup ExecStop for socket-activated shutdown (#4120) - service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923) - cryptsetup: build fixes for "add support for sector-size= option" - udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278) - core: keep the kernel coredump defaults when systemd-coredump is disabled - core: shorten main() a bit, split out coredump initialization - core: set RLIMIT_CORE to unlimited by default (bsc#1108835) - core/mount: fstype may be NULL - journald: don't ship systemd-journald-audit.socket (bsc#1109252) - core: make "tmpfs" dependencies on swapfs a "default" dep, not an "implicit" (bsc#1110445) - mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076) - tmp.mount.hm4: After swap.target (#3087) - Ship systemd-sysv-install helper via the main package This script was part of systemd-sysvinit sub-package but it was wrong since systemd-sysv-install is a script used to redirect enable/disable operations to chkconfig when the unit targets are sysv init scripts. Therefore it's never been a SySV init tool. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2018-2659=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2659=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2018-2659=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): libudev-devel-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-devel-228-150.53.3 - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64): libsystemd0-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libudev1-228-150.53.3 libudev1-debuginfo-228-150.53.3 systemd-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64): libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 - SUSE Linux Enterprise Server 12-SP4 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Desktop 12-SP4 (noarch): systemd-bash-completion-228-150.53.3 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): libsystemd0-228-150.53.3 libsystemd0-32bit-228-150.53.3 libsystemd0-debuginfo-228-150.53.3 libsystemd0-debuginfo-32bit-228-150.53.3 libudev1-228-150.53.3 libudev1-32bit-228-150.53.3 libudev1-debuginfo-228-150.53.3 libudev1-debuginfo-32bit-228-150.53.3 systemd-228-150.53.3 systemd-32bit-228-150.53.3 systemd-debuginfo-228-150.53.3 systemd-debuginfo-32bit-228-150.53.3 systemd-debugsource-228-150.53.3 systemd-sysvinit-228-150.53.3 udev-228-150.53.3 udev-debuginfo-228-150.53.3 References: https://www.suse.com/security/cve/CVE-2018-15686.html https://www.suse.com/security/cve/CVE-2018-15688.html https://bugzilla.suse.com/1106923 https://bugzilla.suse.com/1108835 https://bugzilla.suse.com/1109252 https://bugzilla.suse.com/1110445 https://bugzilla.suse.com/1111278 https://bugzilla.suse.com/1112024 https://bugzilla.suse.com/1113083 https://bugzilla.suse.com/1113632 https://bugzilla.suse.com/1113665 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXEZctGaOgq3Tt24GAQh39hAA0uYZpam7BPnnHWVCOka2e2zl1jKSIGRi ioPlVlb1CKD1CkB8rtMuBYaf53P8bCpbFQV/2y4BeSd2H3QXngSWyGy29xPJm2t1 /yAcOwCLPJnt6xjvrjcXqwnh9cpZ2MobYvrJumr30ta9QxzdA5uEqhqXniSqZJe2 MJNDQ/e3EHuk5ZEMJOoCh2NBLbHQYlD4vkG/Rdg3heGx7ohrYk6K1h9LabA/68UW pzK6G8dvLODlvoPEEWXUsgyM3FsJlW3AWxk84QLksh0RIOLgIADuRGjCQq7fPhOT Hfi4gJgZJqPGS5ztAgQi8ZOrxzhMyEcJZdm4ChvKr1E11Yi7QhrWE6t+ed+CJ3xA +MfY/j8gPQCpb9dFy1zggeffbUvC/FU1/SW0Jit9dWjGNR1Bs5TJW5PdKTu5wxMJ 1adB/ORyaDAF9CDoI+qZfOGKx3m/hvYa7bUYEahmAloEfs6NQqQFK/tmKPi3f1RY 3kt7kXFB/tXz+FGTqOUEymwnJnFeItuDb9tzvpuT47jCHDzayVGI2juE2IXAlHyQ NwJs0s4/Y+Jaue5aqZNe8XuLCGL2E7yy9q7LE29fQ/UAUEwzzOI+mkO7gUaLX7mA Hja/lqm8lEsQrdTqFV1NYsUiTjccWjYDOjk0I8HMq4LmG4VhmqTkTuHKwJkJWRJp Z9ZOtPbW9rQ= =nuDl -----END PGP SIGNATURE-----