This bug was fixed in the package systemd - 229-4ubuntu11
---
systemd (229-4ubuntu11) xenial; urgency=medium
* 73-usb-net-by-mac.rules: Split kernel command line import line.
Reportedly this makes the rule actually work on some platforms. Thanks
Alp Toker! (LP: #1593379)
I verified that with the -proposed version you cannot create orphaned
notify FDs any more in pid 1 using the test case I just added.
** Description changed:
Environment:
Xenial 16.04.1
Amd64
Description.
Systemd fails an assertion in manager_invoke_notify_message when a zero-
Hello Jorge, or anyone else affected,
Accepted systemd into xenial-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu11
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
> Martin, if you can point me at the xenial branch, we can push this
through the security pocket.
https://anonscm.debian.org/cgit/pkg-systemd/systemd.git/commit/?h=ubuntu-xenial=1aa1f84c
(this just cleans up the original -security update to still work with gbp pq)
Martin, if you can point me at the xenial branch, we can push this
through the security pocket. I wanted to wait and see if there were any
further issues addressed (and to not release an update on a Friday).
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch
I added the two patches to the xenial branch, and will test/upload the
SRU tomorrow.
** Changed in: systemd (Ubuntu Xenial)
Assignee: (unassigned) => Martin Pitt (pitti)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7795
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1
** Changed in: systemd
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1 receives a
This bug was fixed in the package systemd - 231-9
---
systemd (231-9) unstable; urgency=medium
* pid1: process zero-length notification messages again.
Just remove the assertion, the "n" value was not used anyway. This fixes
a local DoS due to unprocessed/unclosed fds which
For a follow-up xenial -security update we need:
https://github.com/systemd/systemd/commit/8523bf7dd5
https://github.com/systemd/systemd/commit/9987750e7
which I just cherry-picked into the Debian packaging tree (for yakkety
too):
That initial fix just changed a DoS through assert() into a DoS through
fd exhaustion. This is being handled in
https://github.com/systemd/systemd/pull/4242 .
Please let's handle this upstream first and not put out another USN in
haste -- after all, this is just a local DoS, so far from being a
** Changed in: systemd (Ubuntu Yakkety)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID
** Changed in: systemd
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1 receives a zero-length
This bug was fixed in the package systemd - 229-4ubuntu10
---
systemd (229-4ubuntu10) xenial-security; urgency=medium
* SECURITY UPDATE: zero-length notify message triggers abort/denial of
service
- systemd-dont_assert_on_zero_length_message-lp1628687.patch: change
FYI, I've pushed xenial and yakkety systemd packages with Jorge's
proposed fix from https://github.com/systemd/systemd/pull/4237 in the
ubuntu-security-proposed ppa at https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/ for people to test.
--
You received this bug notification
** Bug watch added: github.com/systemd/systemd/issues #4234
https://github.com/systemd/systemd/issues/4234
** Also affects: systemd via
https://github.com/systemd/systemd/issues/4234
Importance: Unknown
Status: Unknown
** Changed in: systemd (Ubuntu Xenial)
Importance:
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1 receives a
CVE request: http://www.openwall.com/lists/oss-security/2016/09/28/9
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1 receives a
** Also affects: systemd (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Yakkety)
Importance: Undecided
Status: Confirmed
** Changed in: systemd (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1628687
Title:
Assertion failure when PID 1 receives a
20 matches
Mail list logo