Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.852260
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for systemd (openSUSE-SU-2019:0098-1)
Zusammenfassung:The remote host is missing an update for the 'systemd'; package(s) announced via the openSUSE-SU-2019:0098-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'systemd'
package(s) announced via the openSUSE-SU-2019:0098-1 advisory.

Vulnerability Insight:
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through
attacker-controlled alloca()s (bsc#1120323)

- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)

- CVE-2018-6954: Fix mishandling of symlinks present in non-terminal path
components (bsc#1080919)

- Fixed an issue during system startup in relation to encrypted swap disks
(bsc#1119971)

Non-security issues fixed:

- pam_systemd: Fix 'Cannot create session: Already running in a session'
(bsc#1111498)

- systemd-vconsole-setup: vconsole setup fails, fonts will not be copied
to tty (bsc#1114933)

- systemd-tmpfiles-setup: symlinked /tmp to /var/tmp breaking multiple
units (bsc#1045723)

- Fixed installation issue with /etc/machine-id during update (bsc#1117063)

- btrfs: qgroups are assigned to parent qgroups after reboot (bsc#1093753)

- logind: Stop managing VT switches if no sessions are registered on that
VT. (bsc#1101591)

- udev: Downgrade message when setting inotify watch up fails.
(bsc#1005023)

- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.
In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that
uses systemd-detect-virt to detect non-zvm environment. The
systemd-detect-virt returns exit failure code when it detected _none_
state. The exit failure code causes that the hot-add memory block can
not be set to online. (bsc#1076696)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-98=1

Affected Software/OS:
systemd on openSUSE Leap 15.0.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
SuSE Security Announcement: openSUSE-SU-2019:1450 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.