SUSE-SU-2020:1842-1: moderate: Security update for systemd

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Jul 3 19:13:09 MDT 2020


   SUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:1842-1
Rating:             moderate
References:         #1084671 #1154256 #1157315 #1161262 #1161436 
                    #1162698 #1164538 #1165633 #1167622 #1171145 
                    
Cross-References:   CVE-2019-20386
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP4
                    SUSE Linux Enterprise Server 12-SP4
______________________________________________________________________________

   An update that solves one vulnerability and has 9 fixes is
   now available.

Description:

   This update for systemd fixes the following issues:

   - CVE-2019-20386: Fixed a memory leak when executing the udevadm trigger
     command (bsc#1161436).
   - Renamed the persistent link for ATA devices (bsc#1164538)
   - shared/install: try harder to find enablement symlinks when disabling a
     unit (bsc#1157315)
   - tmpfiles: removed unnecessary assert (bsc#1171145)
   - pid1: by default make user units inherit their umask from the user
     manager (bsc#1162698)
   - manager: fixed job mode when signalled to shutdown etc (bsc#1161262)
   - coredump: fixed bug that loses core dump files when core dumps are
     compressed and disk space is low. (bsc#1167622)
   - udev: inform systemd how many workers we can potentially spawn (#4036)
     (bsc#1165633)
   - libblkid: open device in nonblock mode. (bsc#1084671)
   - udev/cdrom_id: Do not open CD-rom in exclusive mode. (bsc#1154256)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP4:

      zypper in -t patch SUSE-SLE-SDK-12-SP4-2020-1842=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-1842=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):

      libudev-devel-228-150.86.3
      systemd-debuginfo-228-150.86.3
      systemd-debugsource-228-150.86.3
      systemd-devel-228-150.86.3

   - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

      libsystemd0-228-150.86.3
      libsystemd0-debuginfo-228-150.86.3
      libudev-devel-228-150.86.3
      libudev1-228-150.86.3
      libudev1-debuginfo-228-150.86.3
      systemd-228-150.86.3
      systemd-debuginfo-228-150.86.3
      systemd-debugsource-228-150.86.3
      systemd-devel-228-150.86.3
      systemd-sysvinit-228-150.86.3
      udev-228-150.86.3
      udev-debuginfo-228-150.86.3

   - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):

      libsystemd0-32bit-228-150.86.3
      libsystemd0-debuginfo-32bit-228-150.86.3
      libudev1-32bit-228-150.86.3
      libudev1-debuginfo-32bit-228-150.86.3
      systemd-32bit-228-150.86.3
      systemd-debuginfo-32bit-228-150.86.3

   - SUSE Linux Enterprise Server 12-SP4 (noarch):

      systemd-bash-completion-228-150.86.3


References:

   https://www.suse.com/security/cve/CVE-2019-20386.html
   https://bugzilla.suse.com/1084671
   https://bugzilla.suse.com/1154256
   https://bugzilla.suse.com/1157315
   https://bugzilla.suse.com/1161262
   https://bugzilla.suse.com/1161436
   https://bugzilla.suse.com/1162698
   https://bugzilla.suse.com/1164538
   https://bugzilla.suse.com/1165633
   https://bugzilla.suse.com/1167622
   https://bugzilla.suse.com/1171145



More information about the sle-updates mailing list