Security update for systemd

This update for systemd fixes the following issues:

This security issue was fixed:

- CVE-2016-10156: Fix permissions set on permanent timer timestamp files, preventing local unprivileged users from escalating privileges (bsc#1020601).

These non-security issues were fixed:

- Fix permission set on /var/lib/systemd/linger/*
- install: follow config_path symlink (#3362)
- install: fix disable when /etc/systemd/system is a symlink (bsc#1014560)
- run: make --slice= work in conjunction with --scope (bsc#1014566)
- core: don't dispatch load queue when setting Slice= for transient units
- systemctl: remove duplicate entries showed by list-dependencies (#5049) (bsc#1012266)
- rule: don't automatically online standby memory on s390x (bsc#997682)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1014560
systemctl commands fails when /etc/systemd/system is a symlink
bnc#997682
Offline memory in OS is showing less memory than z/VM configured STANDBY memory for the guest
bnc#1020601
VUL-0: EMBARGOED: CVE-2016-10156: systemd: world writable suid files local root vulnerability
bnc#1014566
systemd-run does not make transient scope unit part of slice specified via the --slice arg
bnc#1012266
systemctl list-dependencies: instantiated services are listed twice
Selected Binaries
openSUSE Build Service is sponsored by