English | Deutsch | Español | Português
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SuSE Update for systemd openSUSE-SU-2018:3695-1 (systemd)
Summary:The remote host is missing an update for the 'systemd'; package(s) announced via the openSUSE-SU-2018:3695_1 advisory.
The remote host is missing an update for the 'systemd'
package(s) announced via the openSUSE-SU-2018:3695_1 advisory.

Vulnerability Insight:
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of
systemd allowed a malicious dhcp6 server to overwrite heap memory in
systemd-networkd. (bsc#1113632)

- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an
attacker to supply arbitrary state across systemd re-execution via
NotifyAccess. This can be used to improperly influence systemd execution
and possibly lead to root privilege escalation. (bsc#1113665)

Non security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit

- core: skip unit deserialization and move to the next one when
unit_deserialize() fails

- core: properly handle deserialization of unknown unit types (#6476)

- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)

- logind: use manager_get_user_by_pid() where appropriate

- logind: rework manager_get_{usersession}_by_pid() a bit

- login: fix user@.service case, so we don't allow nested sessions (#8051)

- core: be more defensive if we can't determine per-connection socket peer

- core: introduce systemd.early_core_pattern= kernel cmdline option

- core: add missing 'continue' statement

- core/mount: fstype may be NULL

- journald: don't ship systemd-journald-audit.socket (bsc#1109252)

- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an
'implicit' (bsc#1110445)

- mount: make sure we unmount tmpfs mounts before we deactivate swaps

- detect-virt: do not try to read all of /proc/cpuinfo (bsc#1109197)

- emergency: make sure console password agents don't interfere with the
emergency shell

- man: document that 'nofail' also has an effect on ordering

- journald: take leading spaces into account in syslog_parse_identifier

- journal: do not remove multiple spaces after identifier in syslog message

- syslog: fix segfault in syslog_parse_priority()

- journal: fix syslog_parse_identifier()

- install: drop left-over debug message (#6913)

- Ship systemd-sysv-install helper via the main package This script was
part of systemd-sysvinit sub-package but it was wrong since
systemd-sysv-install is a script used to redirect enable/disable
operations to chkconfig when the unit targets are sysv init scripts.
Therefore it's never been a SySV init tool.

- Add udev.no-partlabel-links kernel command-line option. This option can
be used to disable the generation of the by-partlabel symlinks
regardless of the name used. (bsc#1089761)

- man: SystemMaxUse= clar ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
systemd on openSUSE Leap 15.0.

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-15686
Common Vulnerability Exposure (CVE) ID: CVE-2018-15688
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 72306 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Registered User Login

 Forgot userid or passwd?

Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.