Security update for systemd

SUSE Security Update: Security update for systemd
Announcement ID: SUSE-SU-2020:0353-1
Rating: important
References: #1106383 #1127557 #1133495 #1139459 #1140631 #1150595 #1151377 #1151506 #1154043 #1154948 #1155574 #1156482 #1159814 #1162108
Cross-References:CVE-2020-1712
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12-SP5
  • SUSE Linux Enterprise Server 12-SP5

An update that solves one vulnerability and has 13 fixes is now available.

Description:

This update for systemd provides the following fixes:

  • CVE-2020-1712 (bsc#bsc#1162108) Fix a heap use-after-free vulnerability, when asynchronous Polkit queries were performed while handling Dbus messages. A local unprivileged attacker could have abused this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted Dbus messages.
  • sd-bus: Deal with cookie overruns. (bsc#1150595)
  • rules: Add by-id symlinks for persistent memory. (bsc#1140631)
  • Drop the old fds used for logging and reopen them in the sub process before doing any new logging. (bsc#1154948)
  • Fix warnings thrown during package installation (bsc#1154043)
  • Fix for systemctl hanging by restart. (bsc#1139459)
  • man: mention that alias names are only effective after 'systemctl enable'. (bsc#1151377)
  • ask-password: improve log message when inotify limit is reached. (bsc#1155574)
  • udevd: wait for workers to finish when exiting. (bsc#1106383)
  • core: fragments of masked units ought not be considered for NeedDaemonReload. (bsc#1156482)
  • udev: fix 'NULL' deref when executing rules. (bsc#1151506)
  • Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-353=1
  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-353=1

Package List:

  • SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
    • libudev-devel-228-157.9.1
    • systemd-debuginfo-228-157.9.1
    • systemd-debugsource-228-157.9.1
    • systemd-devel-228-157.9.1
  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • libsystemd0-228-157.9.1
    • libsystemd0-debuginfo-228-157.9.1
    • libudev1-228-157.9.1
    • libudev1-debuginfo-228-157.9.1
    • systemd-228-157.9.1
    • systemd-debuginfo-228-157.9.1
    • systemd-debugsource-228-157.9.1
    • systemd-sysvinit-228-157.9.1
    • udev-228-157.9.1
    • udev-debuginfo-228-157.9.1
  • SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
    • libsystemd0-32bit-228-157.9.1
    • libsystemd0-debuginfo-32bit-228-157.9.1
    • libudev1-32bit-228-157.9.1
    • libudev1-debuginfo-32bit-228-157.9.1
    • systemd-32bit-228-157.9.1
    • systemd-debuginfo-32bit-228-157.9.1
  • SUSE Linux Enterprise Server 12-SP5 (noarch):
    • systemd-bash-completion-228-157.9.1

References: