Moderate: systemd security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2019-15718   CVE-2019-15718   CVE-2019-15718  

Synopsis

Moderate: systemd security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

An update for systemd is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

  • systemd: systemd-resolved allows unprivileged users to configure DNS (CVE-2019-15718)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 1658691 - systemd logs useless seccomp related messages in debug mode
  • BZ - 1667065 - systemd tmp mount not working
  • BZ - 1670728 - add memory hotplug udev rule
  • BZ - 1683334 - Backport Type=exec service type
  • BZ - 1689832 - Please backport systemd-analyze security
  • BZ - 1691691 - nss-systemd should not set ENOENT errno for getpwent
  • BZ - 1691817 - Leading white space removed in journalctl
  • BZ - 1692991 - [PATCH] bus-socket: Fix line_begins() to accept word matching full
  • BZ - 1694999 - sd-bus: deal with cookie overruns
  • BZ - 1695601 - backport: logs-show: use grey color for de-emphasizing journal log output
  • BZ - 1697893 - Fix systemd-nspawn scope allocation/deallocation
  • BZ - 1703485 - scopes using Delegate=yes aren't getting terminated gracefully
  • BZ - 1705971 - Backport fixes for issues reported by LGTM static analysis
  • BZ - 1707175 - journald does not sanitize/normalize SYSLOG_FACILITY values
  • BZ - 1708849 - systemd-journal-upload reports 411: Content-Length header is required
  • BZ - 1712524 - Please consider backport of upstream PR#11467
  • BZ - 1719153 - Backport: cryptsetup: Add LUKS2 token support
  • BZ - 1733395 - bash completion missing for systemd-analyze security
  • BZ - 1746057 - CVE-2019-15718 systemd: systemd-resolved allows unprivileged users to configure DNS

CVEs

References