QID 750865

Date Published: 2021-07-22

QID 750865: SUSE Enterprise Linux Security Update for systemd (SUSE-SU-2021:2423-1)

This update for systemd fixes the following issues: security issues fixed: - cve-2021-33910: fixed a denial of service (stack exhaustion) in systemd (pid 1) (bsc#1188063) other fixes: - mount-util: shorten the loop a bit (#7545) - mount-util: do not use the official max_handle_sz (#7523) - mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761) - mount-util: fix bad indenting - mount-util: eoverflow might have other causes than buffer size issues - mount-util: fix error propagation in fd_fdinfo_mnt_id() - mount-util: drop exponential buffer growing in name_to_handle_at_loop() - udev: port udev_has_devtmpfs() to use path_get_mnt_id() - mount-util: add new path_get_mnt_id() call that queries the mnt id of a path - mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at() - mount-util: accept that name_to_handle_at() might fail with eperm (#5499) - basic: fallback to the fstat if we dont have access to the /proc/self/fdinfo - sysusers: use the usual comment style - test/test-21-sysusers: add tests for new functionality - sysusers: allow admin/runtime overrides to command-line config - basic/strv: add function to insert items at position - sysusers: allow the shell to be specified - sysusers: move various user credential validity checks to src/basic/ - man: reformat table in sysusers.d(5) - sysusers: take configuration as positional arguments - sysusers: emit a bit more info at debug level when locking fails - sysusers: allow force reusing existing user/group ids (#8037) - sysusers: ensure gid in uid:gid syntax exists - sysusers: make add_group always create a group - test: add test-21-sysusers test - sysuser: use orderedhashmap - sysusers: allow uid:gid in sysusers.conf files - sysusers: fix memleak (#4430) - these commits implement the option --replace for systemd-sysusers so %sysusers_create_package can be introduced in sle and packages can rely on this rpm macro without wondering whether the macro is available on the different target the package is submitted to.
- expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807) - systemctl: add --value option - execute: make sure to call into pam after initializing resource limits (bsc#1184967) - rlimit-util: introduce setrlimit_closest_all() - system-conf: drop reference to shutdownwatchdogusec= - core: rename shutdownwatchdogsec to rebootwatchdogsec (bsc#1185331) - return -eagain instead of -ealready from unit_reload (bsc#1185046) - rules: dont ignore xen virtual interfaces anymore (bsc#1178561) - write_net_rules: set execute bits (bsc#1178561) - udev: rework network device renaming - revert "revert "udev: network device renaming - immediately give up if the target name isnt available""

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Medium - 5.5 severity.
  • CVSS V2 rated as Medium - 4.9 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2423-1 to address this issue and obtain further details.

    CVEs related to QID 750865

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2423-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html