Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP3:GA
patchinfo.11099
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.11099
<patchinfo incident="11099"> <issue tracker="jsc" id="SLE-5933"/> <issue tracker="cve" id="2019-3842"/> <issue tracker="cve" id="2018-6954"/> <issue tracker="cve" id="2019-6454"/> <issue tracker="bnc" id="1080919">VUL-0: CVE-2018-6954: systemd: systemd-tmpfiles mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files</issue> <issue tracker="bnc" id="1132721">L3: Customer encountered the systemd issue small BUS_WQUEUE_MAX #4068 with systemd-228-150.63.1</issue> <issue tracker="bnc" id="1125352">VUL-0: CVE-2019-6454: systemd: crashes in long dbus messages</issue> <issue tracker="bnc" id="1127557">SLES 12 SP4 - Linux activates all reserve memory on IPL (systemd?)</issue> <issue tracker="bnc" id="1128657">systemd: failed to restart timer.service after problem "Failed to watch PID 11353 from service timer.service"</issue> <issue tracker="bnc" id="1121563">GCC 9: systemd build fails</issue> <issue tracker="bnc" id="1132348">VUL-1: CVE-2019-3842: systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"</issue> <issue tracker="bnc" id="1130230">quilt: fails to unpack systemd.spec</issue> <issue tracker="bnc" id="955942">systemd Failed to watch PID error</issue> <issue tracker="bnc" id="1126056">SLES 12 SP4 - Problems with chcpu on large s390x LPARs (util-linux?/systemd?)</issue> <issue tracker="bnc" id="1132400">udev: debug log spammed with "maximum number (248) of children reached"</issue> <packager>fbui</packager> <rating>important</rating> <category>security</category> <summary>Security update for systemd</summary> <description>This update for systemd fixes the following issues: Security issues fixed: - CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles which allowed a local user to obtain ownership of arbitrary files (bsc#1080919). - CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348). - CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352). Non-security issues fixed: - systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933) - udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400) - sd-bus: bump message queue size again (bsc#1132721) - core: only watch processes when it's really necessary (bsc#955942 bsc#1128657) - rules: load drivers only on "add" events (bsc#1126056) - sysctl: Don't pass null directive argument to '%s' (bsc#1121563) - Do not automatically online memory on s390x (bsc#1127557) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor