File _patchinfo of Package patchinfo.5692
<patchinfo incident="5692"> <packager>fbui</packager> <issue tracker="bnc" id="1001765">VUL-0: CVE-2016-7795, CVE-2016-7796: systemd: local denial-of-service attack via notification socket</issue> <issue tracker="bnc" id="1000435">journal: verification of the journal unexpectedly fails with FSS enabled</issue> <issue tracker="bnc" id="982211">PackageKit: error message during upgrade</issue> <issue tracker="bnc" id="954374">VUL-1: systemd: unprivileged user can freeze journald</issue> <issue tracker="bnc" id="970293">systemd 228: service file installation complains of missing [Install] section</issue> <issue tracker="bnc" id="996269">systemd: Trying to run as user instance, but $XDG_RUNTIME_DIR is not set.</issue> <issue tracker="cve" id="2016-7796"></issue> <category>security</category> <rating>important</rating> <summary>Security update for systemd</summary> <description>This update for systemd fixes the following issues: - CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd. (bsc#1001765) Additionally, the following non-security fixes are included: - Fix HMAC calculation when appending a data object to journal. (bsc#1000435) - Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374) - Do not warn about missing install info with "preset". (bsc#970293) - Save /run/systemd/users/UID before starting user@.service. (bsc#996269) - Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211) </description> <reboot_needed/> </patchinfo>