SUSE-SU-2021:3348-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3348-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:3348-1
Related
Published
2021-10-12T11:08:10Z
Modified
2021-10-12T11:08:10Z
Summary
Security update for systemd
Details

This update for systemd fixes the following issues:

  • CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

  • logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).

  • Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).
  • Rules weren't applied to dm devices (multipath) (bsc#1188713).
  • Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).
  • Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).
  • Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).
  • Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 SP2 / systemd

Package

Name
systemd
Purl
purl:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
234-24.93.1

Ecosystem specific

{
    "binaries": [
        {
            "systemd": "234-24.93.1",
            "libsystemd0": "234-24.93.1",
            "systemd-devel": "234-24.93.1",
            "libudev-devel": "234-24.93.1",
            "udev": "234-24.93.1",
            "libudev1": "234-24.93.1",
            "systemd-coredump": "234-24.93.1",
            "libudev1-32bit": "234-24.93.1",
            "systemd-32bit": "234-24.93.1",
            "systemd-bash-completion": "234-24.93.1",
            "libsystemd0-32bit": "234-24.93.1",
            "systemd-container": "234-24.93.1",
            "systemd-sysvinit": "234-24.93.1"
        }
    ]
}