File _patchinfo of Package patchinfo.39125

<patchinfo incident="39125">
  <issue tracker="bnc" id="1211725">systemd-fsck@.service not instantiated at boot for filesystems with "noauto" (4th field) and "2" (6th field) in /etc/fstab</issue>
  <issue tracker="bnc" id="1215241">Failed to release session: Interrupted system call in SLES12 SP3 Teradata</issue>
  <issue tracker="bnc" id="1243935">VUL-0: CVE-2025-4598: systemd: systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump</issue>
  <issue tracker="bnc" id="1208958">VUL-0: CVE-2023-26604: systemd: privilege escalation via the less pager</issue>
  <issue tracker="bnc" id="1205000">VUL-0: CVE-2022-4415: systemd-coredump: systemd-coredump not respecting fs.suid_dumpable kernel setting</issue>
  <issue tracker="bnc" id="1211576">L3-Question: server hangs on shutdown: "Failed to unmount /usr: Device or resource busy"</issue>
  <issue tracker="cve" id="2025-4598"/>
  <issue tracker="cve" id="2022-4415"/>
  <issue tracker="cve" id="2023-26604"/>
  <packager>fbui</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for systemd</summary>
  <description>This update for systemd fixes the following issues:

- CVE-2025-4598: Race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).
- CVE-2023-26604: Privilege escalation via the less pager (bsc#1208958).
- CVE-2022-4415: systemd-coredump was not respecting fs.suid_dumpable kernel setting (bsc#1205000).

Other bugfixes:

- clarify passno and noauto combination in /etc/fstab (bsc#1211725)
- handle -EINTR return from bus_poll() (bsc#1215241)
- /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576)
</description>
</patchinfo>
openSUSE Build Service is sponsored by