SUSE: 2019:2307-1 moderate: util-linux and shadow

    Date 05 Sep 2019
    762
    Posted By LinuxSecurity Advisories
    An update that contains security fixes can now be installed.
    
       SUSE Security Update: Security update for util-linux and shadow
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:2307-1
    Rating:             moderate
    References:         #1081947 #1082293 #1085196 #1106214 #1121197 
                        #1122417 #1125886 #1127701 #1135534 #1135708 
                        #1141113 #353876 
    Affected Products:
                        SUSE Linux Enterprise Module for Server Applications 15-SP1
                        SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
                        SUSE Linux Enterprise Module for Basesystem 15-SP1
    ______________________________________________________________________________
    
       An update that contains security fixes can now be installed.
    
    Description:
    
       This update for util-linux and shadow fixes the following issues:
    
       util-linux:
    
       - Fixed an issue where PATH settings in /etc/default/su being ignored
         (bsc#1121197)
       - Prevent outdated pam files (bsc#1082293).
       - De-duplicate fstrim -A properly (bsc#1127701).
       - Do not trim read-only volumes (bsc#1106214).
       - Integrate pam_keyinit pam module to login (bsc#1081947).
       - Perform one-time reset of /etc/default/su (bsc#1121197).
       - Fix problems in reading of login.defs values (bsc#1121197)
       - libmount: To prevent incorrect behavior, recognize more pseudofs and
         netfs (bsc#1122417).
       - raw.service: Add RemainAfterExit=yes (bsc#1135534).
       - agetty: Return previous response of agetty for special characters
         (bsc#1085196, bsc#1125886)
       - libmount: print a blacklist hint for "unknown filesystem type"
         (jsc#SUSE-4085, fate#326832)
       - Fix /etc/default/su comments and create /etc/default/runuser
         (bsc#1121197).
    
       shadow:
    
       - Fixed an issue where PATH settings in /etc/default/su being ignored
         (bsc#1121197)
       - Fix segfault in useradd during setting password inactivity period.
         (bsc#1141113)
       - Hardening for su wrappers (bsc#353876)
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Module for Server Applications 15-SP1:
    
          zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2307=1
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:
    
          zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2307=1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1:
    
          zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-2307=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le s390x x86_64):
    
          util-linux-systemd-debuginfo-2.33.1-4.5.1
          util-linux-systemd-debugsource-2.33.1-4.5.1
          uuidd-2.33.1-4.5.1
          uuidd-debuginfo-2.33.1-4.5.1
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64):
    
          libfdisk-devel-static-2.33.1-4.5.1
          libmount-devel-static-2.33.1-4.5.1
          libsmartcols-devel-static-2.33.1-4.5.1
          python3-libmount-2.33.1-4.5.1
          python3-libmount-debuginfo-2.33.1-4.5.1
          python3-libmount-debugsource-2.33.1-4.5.1
          util-linux-debuginfo-2.33.1-4.5.1
          util-linux-debugsource-2.33.1-4.5.1
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (x86_64):
    
          libblkid-devel-32bit-2.33.1-4.5.1
          libmount-devel-32bit-2.33.1-4.5.1
          libuuid-devel-32bit-2.33.1-4.5.1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):
    
          libblkid-devel-2.33.1-4.5.1
          libblkid-devel-static-2.33.1-4.5.1
          libblkid1-2.33.1-4.5.1
          libblkid1-debuginfo-2.33.1-4.5.1
          libfdisk-devel-2.33.1-4.5.1
          libfdisk1-2.33.1-4.5.1
          libfdisk1-debuginfo-2.33.1-4.5.1
          libmount-devel-2.33.1-4.5.1
          libmount1-2.33.1-4.5.1
          libmount1-debuginfo-2.33.1-4.5.1
          libsmartcols-devel-2.33.1-4.5.1
          libsmartcols1-2.33.1-4.5.1
          libsmartcols1-debuginfo-2.33.1-4.5.1
          libuuid-devel-2.33.1-4.5.1
          libuuid-devel-static-2.33.1-4.5.1
          libuuid1-2.33.1-4.5.1
          libuuid1-debuginfo-2.33.1-4.5.1
          shadow-4.6-3.5.6
          shadow-debuginfo-4.6-3.5.6
          shadow-debugsource-4.6-3.5.6
          util-linux-2.33.1-4.5.1
          util-linux-debuginfo-2.33.1-4.5.1
          util-linux-debugsource-2.33.1-4.5.1
          util-linux-systemd-2.33.1-4.5.1
          util-linux-systemd-debuginfo-2.33.1-4.5.1
          util-linux-systemd-debugsource-2.33.1-4.5.1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch):
    
          util-linux-lang-2.33.1-4.5.1
    
       - SUSE Linux Enterprise Module for Basesystem 15-SP1 (x86_64):
    
          libblkid1-32bit-2.33.1-4.5.1
          libblkid1-32bit-debuginfo-2.33.1-4.5.1
          libmount1-32bit-2.33.1-4.5.1
          libmount1-32bit-debuginfo-2.33.1-4.5.1
          libuuid1-32bit-2.33.1-4.5.1
          libuuid1-32bit-debuginfo-2.33.1-4.5.1
    
    
    References:
    
       https://bugzilla.suse.com/1081947
       https://bugzilla.suse.com/1082293
       https://bugzilla.suse.com/1085196
       https://bugzilla.suse.com/1106214
       https://bugzilla.suse.com/1121197
       https://bugzilla.suse.com/1122417
       https://bugzilla.suse.com/1125886
       https://bugzilla.suse.com/1127701
       https://bugzilla.suse.com/1135534
       https://bugzilla.suse.com/1135708
       https://bugzilla.suse.com/1141113
       https://bugzilla.suse.com/353876
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":59.09,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":40.91,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.