File _patchinfo of Package patchinfo.9885

<patchinfo incident="9885">
  <issue tracker="bnc" id="1120323">CVE-2018-16864, CVE-2018-16865, CVE-2018-16866: systemd: Qualys Security Advisory</issue>
  <issue tracker="bnc" id="1113665">CVE-2018-15686: systemd: Line splitting via fgets() allows for state injection during daemon-reexec</issue>
  <issue tracker="bnc" id="1068588">/var/log/warn flooded with snmpagentmonitor.service errors</issue>
  <issue tracker="bnc" id="1071558">sysctl character limitation</issue>
  <issue tracker="cve" id="2018-16865"/>
  <issue tracker="cve" id="2018-16864"/>
  <issue tracker="cve" id="2018-15686"/>
  <category>security</category>
  <rating>important</rating>
  <packager>fbui</packager>
  <description>This update for systemd fixes the following issues:

* Fix security vulnerabilities CVE-2018-16864 and CVE-2018-16865 (bsc#1120323):
  Both issues were memory corruptions via attacker-controlled alloca which could
  have been used to gain root privileges by a local attacker.

* Fix security vulnerability CVE-2018-15686 (bsc#1113665): A vulnerability in
  unit_deserialize of systemd used to allow an attacker to supply arbitrary
  state across systemd re-execution via NotifyAccess. This could have been used
  to improperly influence systemd execution and possibly lead to root privilege
  escalation.

* Remedy 2048 character line-length limit in systemd-sysctl code that would
  cause parser failures if /etc/sysctl.conf contained lines that exceeded this
  length (bsc#1071558).

* Fix a bug in systemd's core timer code that would cause timer looping under
  certain conditions, resulting in hundreds of syslog messages being written to
  the journal (bsc#1068588).
</description>
  <summary>Security update for systemd</summary>
</patchinfo>
openSUSE Build Service is sponsored by