![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.852325 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for systemd (openSUSE-SU-2019:0268-1) |
Summary: | The remote host is missing an update for the 'systemd'; package(s) announced via the openSUSE-SU-2019:0268-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'systemd' package(s) announced via the openSUSE-SU-2019:0268-1 advisory. Vulnerability Insight: This update for systemd fixes the following issues: Security vulnerability fixed: - CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS message on the system bus by an unprivileged user (bsc#1125352) Other bug fixes and changes: - journal-remote: set a limit on the number of fields in a message - journal-remote: verify entry length from header - journald: set a limit on the number of fields (1k) - journald: do not store the iovec entry for process commandline on stack - core: include Found state in device dumps - device: fix serialization and deserialization of DeviceFound - fix path in btrfs rule (#6844) - assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025) - Update systemd-system.conf.xml (bsc#1122000) - units: inform user that the default target is started after exiting from rescue or emergency mode - manager: don't skip sigchld handler for main and control pid for services (#3738) - core: Add helper functions unit_{main, control}_pid - manager: Fixing a debug printf formatting mistake (#3640) - manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382) - core: update invoke_sigchld_event() to handle NULL - sigchld_event() - sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631) - unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344) - core: when restarting services, don't close fds - cryptsetup: Add dependency on loopback setup to generated units - journal-gateway: use localStorage['cursor'] only when it has valid value - journal-gateway: explicitly declare local variables - analyze: actually select longest activated-time of services - sd-bus: fix implicit downcast of bitfield reported by LGTM - core: free lines after reading them (bsc#1123892) - pam_systemd: reword message about not creating a session (bsc#1111498) - pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498) - main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658) - sd-bus: if we receive an invalid dbus message, ignore and proceed - automount: don't pass non-blocking pipe to kernel. - units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333) - units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333) This update was imported from the SUSE:SLE-12-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended insta ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: systemd on openSUSE Leap 42.3. Solution: Please install the updated package(s). CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-6454 BugTraq ID: 107081 http://www.securityfocus.com/bid/107081 Debian Security Information: DSA-4393-1 (Google Search) https://www.debian.org/security/2019/dsa-4393 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/ https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html http://www.openwall.com/lists/oss-security/2019/02/18/3 http://www.openwall.com/lists/oss-security/2019/02/19/1 http://www.openwall.com/lists/oss-security/2021/07/20/2 RedHat Security Advisories: RHSA-2019:0368 https://access.redhat.com/errata/RHSA-2019:0368 RedHat Security Advisories: RHSA-2019:0990 https://access.redhat.com/errata/RHSA-2019:0990 RedHat Security Advisories: RHSA-2019:1322 https://access.redhat.com/errata/RHSA-2019:1322 RedHat Security Advisories: RHSA-2019:1502 https://access.redhat.com/errata/RHSA-2019:1502 RedHat Security Advisories: RHSA-2019:2805 https://access.redhat.com/errata/RHSA-2019:2805 SuSE Security Announcement: SUSE-SA:2019:0255-1 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html SuSE Security Announcement: openSUSE-SU-2019:1450 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html https://usn.ubuntu.com/3891-1/ |
Copyright | Copyright (C) 2019 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |