File _patchinfo of Package patchinfo.39125
<patchinfo incident="39125"> <issue tracker="bnc" id="1211725">systemd-fsck@.service not instantiated at boot for filesystems with "noauto" (4th field) and "2" (6th field) in /etc/fstab</issue> <issue tracker="bnc" id="1215241">Failed to release session: Interrupted system call in SLES12 SP3 Teradata</issue> <issue tracker="bnc" id="1243935">VUL-0: CVE-2025-4598: systemd: systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump</issue> <issue tracker="bnc" id="1208958">VUL-0: CVE-2023-26604: systemd: privilege escalation via the less pager</issue> <issue tracker="bnc" id="1205000">VUL-0: CVE-2022-4415: systemd-coredump: systemd-coredump not respecting fs.suid_dumpable kernel setting</issue> <issue tracker="bnc" id="1211576">L3-Question: server hangs on shutdown: "Failed to unmount /usr: Device or resource busy"</issue> <issue tracker="cve" id="2025-4598"/> <issue tracker="cve" id="2022-4415"/> <issue tracker="cve" id="2023-26604"/> <packager>fbui</packager> <rating>important</rating> <category>security</category> <summary>Security update for systemd</summary> <description>This update for systemd fixes the following issues: - CVE-2025-4598: Race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935). - CVE-2023-26604: Privilege escalation via the less pager (bsc#1208958). - CVE-2022-4415: systemd-coredump was not respecting fs.suid_dumpable kernel setting (bsc#1205000). Other bugfixes: - clarify passno and noauto combination in /etc/fstab (bsc#1211725) - handle -EINTR return from bus_poll() (bsc#1215241) - /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576) </description> </patchinfo>