openSUSE Security Update : systemd (openSUSE-2016-1184)

medium Nessus Plugin ID 94060

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for systemd fixes the following issues :

- CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd.
(bsc#1001765)

Additionally, the following non-security fixes are included :

- Fix HMAC calculation when appending a data object to journal. (bsc#1000435)

- Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374)

- Do not warn about missing install info with 'preset'.
(bsc#970293)

- Save /run/systemd/users/UID before starting [email protected]. (bsc#996269)

- Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211)

Solution

Update the affected systemd packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1000435

https://bugzilla.opensuse.org/show_bug.cgi?id=1001765

https://bugzilla.opensuse.org/show_bug.cgi?id=954374

https://bugzilla.opensuse.org/show_bug.cgi?id=970293

https://bugzilla.opensuse.org/show_bug.cgi?id=982211

https://bugzilla.opensuse.org/show_bug.cgi?id=996269

Plugin Details

Severity: Medium

ID: 94060

File Name: openSUSE-2016-1184.nasl

Version: 2.4

Type: local

Agent: unix

Published: 10/14/2016

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:systemd-debuginfo, p-cpe:/a:novell:opensuse:nss-myhostname-32bit, p-cpe:/a:novell:opensuse:systemd-mini, p-cpe:/a:novell:opensuse:nss-myhostname-debuginfo-32bit, p-cpe:/a:novell:opensuse:libudev-mini1-debuginfo, p-cpe:/a:novell:opensuse:systemd-mini-sysvinit, p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo-32bit, p-cpe:/a:novell:opensuse:nss-myhostname, p-cpe:/a:novell:opensuse:libudev1-debuginfo-32bit, p-cpe:/a:novell:opensuse:systemd-mini-debugsource, p-cpe:/a:novell:opensuse:libudev-devel, p-cpe:/a:novell:opensuse:systemd-mini-debuginfo, p-cpe:/a:novell:opensuse:systemd-journal-gateway, p-cpe:/a:novell:opensuse:libudev1-debuginfo, p-cpe:/a:novell:opensuse:libgudev-1_0-0-32bit, p-cpe:/a:novell:opensuse:systemd-debugsource, p-cpe:/a:novell:opensuse:typelib-1_0-gudev-1_0, cpe:/o:novell:opensuse:13.2, p-cpe:/a:novell:opensuse:systemd-sysvinit, p-cpe:/a:novell:opensuse:udev, p-cpe:/a:novell:opensuse:udev-mini-debuginfo, p-cpe:/a:novell:opensuse:systemd-debuginfo-32bit, p-cpe:/a:novell:opensuse:systemd-logger, p-cpe:/a:novell:opensuse:libudev-mini-devel, p-cpe:/a:novell:opensuse:udev-mini, p-cpe:/a:novell:opensuse:libudev1-32bit, p-cpe:/a:novell:opensuse:systemd-devel, p-cpe:/a:novell:opensuse:libudev-mini1, p-cpe:/a:novell:opensuse:systemd, p-cpe:/a:novell:opensuse:systemd-journal-gateway-debuginfo, p-cpe:/a:novell:opensuse:udev-debuginfo, p-cpe:/a:novell:opensuse:systemd-32bit, p-cpe:/a:novell:opensuse:libudev1, p-cpe:/a:novell:opensuse:libgudev-1_0-devel, p-cpe:/a:novell:opensuse:nss-myhostname-debuginfo, p-cpe:/a:novell:opensuse:systemd-mini-devel, p-cpe:/a:novell:opensuse:libgudev-1_0-0, p-cpe:/a:novell:opensuse:systemd-bash-completion, p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 10/13/2016

Reference Information

CVE: CVE-2016-7796