File _patchinfo of Package patchinfo.27527
<patchinfo incident="27527">
<issue tracker="bnc" id="1205000">VUL-0: CVE-2022-4415: systemd-coredump: systemd-coredump not respecting fs.suid_dumpable kernel setting</issue>
<issue tracker="bnc" id="1204944">Problem accessing TPM when secure boot is enabled</issue>
<issue tracker="bnc" id="1207264">"%config(noreplace) %{_sysconfdir}/pam.d/systemd-user" missing in systemd.spec</issue>
<issue tracker="cve" id="2022-4415"/>
<issue tracker="jsc" id="PED-2663"/>
<packager>fbui</packager>
<rating>moderate</rating>
<category>security</category>
<reboot_needed/>
<summary>Security update for systemd</summary>
<description>This update for systemd fixes the following issues:
- CVE-2022-4415: Fixed an issue where users could access coredumps
with changed uid, gid or capabilities (bsc#1205000).
Non-security fixes:
- Enabled the pstore service (jsc#PED-2663).
- Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944).
- Fixed an issue where a pamd file could get accidentally overwritten
after an update (bsc#1207264).
</description>
</patchinfo>