openSUSE Security Update : systemd (openSUSE-2016-648)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for SystemD provides fixes and enhancements.

The following security issue has been fixed :

- Don't allow read access to journal files to users.
(bsc#972612, CVE-2014-9770, CVE-2015-8842)

The following non-security issues have been fixed :

- Restore initrd-udevadm-cleanup-db.service. (bsc#978275,

- Incorrect permissions set after boot on journal files.

- Exclude device-mapper from block device ownership event
locking. (bsc#972727)

- Explicitly set mode for /run/log.

- Don't apply sgid and executable bit to journal files,
only the directories they are contained in.

- Add ability to mask access mode by pre-existing access
mode on files/directories.

- No need to pass --all if inactive is explicitly
requested in list-units. (bsc#967122)

- Fix automount option and don't start associated mount
unit at boot. (bsc#970423)

- Support more than just power-gpio-key. (fate#318444,

- Add standard gpio power button support. (fate#318444,

- Downgrade warnings about wanted unit which are not
found. (bsc#960158)

- Shorten hostname before checking for trailing dot.

- Remove WorkingDirectory parameter from emergency, rescue
and console-shell.service. (bsc#959886)

- Don't ship boot.udev and systemd-journald.init anymore.

- Revert 'log: honour the kernel's quiet cmdline
argument'. (bsc#963230)

This update was imported from the SUSE:SLE-12-SP1:Update update

See also :

Solution :

Update the affected systemd packages.

Risk factor :

Low / CVSS Base Score : 2.1

Family: SuSE Local Security Checks

Nessus Plugin ID: 91402 ()

Bugtraq ID:

CVE ID: CVE-2014-9770

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now