openSUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2017:0287-1
Rating:             important
References:         #1012266 #1014560 #1014566 #1020601 #997682 
                    
Cross-References:   CVE-2016-10156
Affected Products:
                    openSUSE Leap 42.2
______________________________________________________________________________

   An update that solves one vulnerability and has four fixes
   is now available.

Description:


   This update for systemd fixes the following issues:

   This security issue was fixed:

   - CVE-2016-10156: Fix permissions set on permanent timer timestamp files,
     preventing local unprivileged users from escalating privileges
     (bsc#1020601).

   These non-security issues were fixed:

   - Fix permission set on /var/lib/systemd/linger/*
   - install: follow config_path symlink (#3362)
   - install: fix disable when /etc/systemd/system is a symlink (bsc#1014560)
   - run: make --slice= work in conjunction with --scope (bsc#1014566)
   - core: don't dispatch load queue when setting Slice= for transient units
   - systemctl: remove duplicate entries showed by list-dependencies (#5049)
     (bsc#1012266)
   - rule: don't automatically online standby memory on s390x (bsc#997682)

   This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.2:

      zypper in -t patch openSUSE-2017-150=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.2 (i586 x86_64):

      libsystemd0-228-22.1
      libsystemd0-debuginfo-228-22.1
      libsystemd0-mini-228-22.1
      libsystemd0-mini-debuginfo-228-22.1
      libudev-devel-228-22.1
      libudev-mini-devel-228-22.1
      libudev-mini1-228-22.1
      libudev-mini1-debuginfo-228-22.1
      libudev1-228-22.1
      libudev1-debuginfo-228-22.1
      nss-myhostname-228-22.1
      nss-myhostname-debuginfo-228-22.1
      nss-mymachines-228-22.1
      nss-mymachines-debuginfo-228-22.1
      systemd-228-22.1
      systemd-debuginfo-228-22.1
      systemd-debugsource-228-22.1
      systemd-devel-228-22.1
      systemd-logger-228-22.1
      systemd-mini-228-22.1
      systemd-mini-debuginfo-228-22.1
      systemd-mini-debugsource-228-22.1
      systemd-mini-devel-228-22.1
      systemd-mini-sysvinit-228-22.1
      systemd-sysvinit-228-22.1
      udev-228-22.1
      udev-debuginfo-228-22.1
      udev-mini-228-22.1
      udev-mini-debuginfo-228-22.1

   - openSUSE Leap 42.2 (x86_64):

      libsystemd0-32bit-228-22.1
      libsystemd0-debuginfo-32bit-228-22.1
      libudev1-32bit-228-22.1
      libudev1-debuginfo-32bit-228-22.1
      nss-myhostname-32bit-228-22.1
      nss-myhostname-debuginfo-32bit-228-22.1
      systemd-32bit-228-22.1
      systemd-debuginfo-32bit-228-22.1

   - openSUSE Leap 42.2 (noarch):

      systemd-bash-completion-228-22.1
      systemd-mini-bash-completion-228-22.1


References:

   https://www.suse.com/security/cve/CVE-2016-10156.html
   https://bugzilla.suse.com/1012266
   https://bugzilla.suse.com/1014560
   https://bugzilla.suse.com/1014566
   https://bugzilla.suse.com/1020601
   https://bugzilla.suse.com/997682

openSUSE: 2017:0287-1: important: systemd

January 25, 2017
An update that solves one vulnerability and has four fixes An update that solves one vulnerability and has four fixes An update that solves one vulnerability and has four fixes is ...

Description

This update for systemd fixes the following issues: This security issue was fixed: - CVE-2016-10156: Fix permissions set on permanent timer timestamp files, preventing local unprivileged users from escalating privileges (bsc#1020601). These non-security issues were fixed: - Fix permission set on /var/lib/systemd/linger/* - install: follow config_path symlink (#3362) - install: fix disable when /etc/systemd/system is a symlink (bsc#1014560) - run: make --slice= work in conjunction with --scope (bsc#1014566) - core: don't dispatch load queue when setting Slice= for transient units - systemctl: remove duplicate entries showed by list-dependencies (#5049) (bsc#1012266) - rule: don't automatically online standby memory on s390x (bsc#997682) This update was imported from the SUSE:SLE-12-SP2:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-150=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Leap 42.2 (i586 x86_64): libsystemd0-228-22.1 libsystemd0-debuginfo-228-22.1 libsystemd0-mini-228-22.1 libsystemd0-mini-debuginfo-228-22.1 libudev-devel-228-22.1 libudev-mini-devel-228-22.1 libudev-mini1-228-22.1 libudev-mini1-debuginfo-228-22.1 libudev1-228-22.1 libudev1-debuginfo-228-22.1 nss-myhostname-228-22.1 nss-myhostname-debuginfo-228-22.1 nss-mymachines-228-22.1 nss-mymachines-debuginfo-228-22.1 systemd-228-22.1 systemd-debuginfo-228-22.1 systemd-debugsource-228-22.1 systemd-devel-228-22.1 systemd-logger-228-22.1 systemd-mini-228-22.1 systemd-mini-debuginfo-228-22.1 systemd-mini-debugsource-228-22.1 systemd-mini-devel-228-22.1 systemd-mini-sysvinit-228-22.1 systemd-sysvinit-228-22.1 udev-228-22.1 udev-debuginfo-228-22.1 udev-mini-228-22.1 udev-mini-debuginfo-228-22.1 - openSUSE Leap 42.2 (x86_64): libsystemd0-32bit-228-22.1 libsystemd0-debuginfo-32bit-228-22.1 libudev1-32bit-228-22.1 libudev1-debuginfo-32bit-228-22.1 nss-myhostname-32bit-228-22.1 nss-myhostname-debuginfo-32bit-228-22.1 systemd-32bit-228-22.1 systemd-debuginfo-32bit-228-22.1 - openSUSE Leap 42.2 (noarch): systemd-bash-completion-228-22.1 systemd-mini-bash-completion-228-22.1


References

https://www.suse.com/security/cve/CVE-2016-10156.html https://bugzilla.suse.com/1012266 https://bugzilla.suse.com/1014560 https://bugzilla.suse.com/1014566 https://bugzilla.suse.com/1020601 https://bugzilla.suse.com/997682


Severity
Announcement ID: openSUSE-SU-2017:0287-1
Rating: important
Affected Products: openSUSE Leap 42.2

Related News