SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1103-1
Rating:             important
References:         #1038841 #1081947 #1082293 #1084671 #1085196 
                    #1106214 #1116347 #1122417 #1125886 #1135534 
                    #1135708 #1151708 #1168235 #1168389 #1169006 
                    #1172427 #1174942 #1175514 #1175623 #1178236 
                    #1178554 #1178825 #1188921 #1194642 
Cross-References:   CVE-2021-37600
CVSS scores:
                    CVE-2021-37600 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-37600 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

   An update that solves one vulnerability and has 23 fixes is
   now available.

Description:

   This update for util-linux fixes the following issues:

   - Improve throughput and reduce clock sequence increments for high load
     situation with time based version 1 uuids. (bsc#1194642)
   - Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
   - Warn if uuidd lock state is not usable. (bsc#1194642)
   - Fix "su -s" bash completion. (bsc#1172427)
   - CVE-2021-37600: Fixed an integer overflow which could lead to buffer
     overflow in get_sem_elements. (bsc#1188921)
   - Load /etc/default/su (bsc#1116347).
   - Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
   - Do not trim read-only volumes (bsc#1106214).
   - libmount: To prevent incorrect behavior, recognize more pseudofs and
     netfs (bsc#1122417).
   - agetty: Reload issue only if it is really needed (bsc#1085196)
   - agetty: Return previous response of agetty for special characters
     (bsc#1085196, bsc#1125886)
   - blockdev: Do not fail --report on kpartx-style partitions on multipath.
     (bsc#1168235)
   - nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
   - Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
   - libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
   - Avoid sulogin failing on not existing or not functional console devices.
     (bsc#1175514)
   - Build with libudev support to support non-root users. (bsc#1169006)
   - lscpu: avoid segfault on PowerPC systems with valid hardware
     configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
   - Fix for warning on mounts to CIFS with mount. (bsc#1174942)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1103=1



Package List:

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      libblkid1-2.28-44.35.1
      libblkid1-32bit-2.28-44.35.1
      libblkid1-debuginfo-2.28-44.35.1
      libblkid1-debuginfo-32bit-2.28-44.35.1
      libfdisk1-2.28-44.35.1
      libfdisk1-debuginfo-2.28-44.35.1
      libmount1-2.28-44.35.1
      libmount1-32bit-2.28-44.35.1
      libmount1-debuginfo-2.28-44.35.1
      libmount1-debuginfo-32bit-2.28-44.35.1
      libsmartcols1-2.28-44.35.1
      libsmartcols1-debuginfo-2.28-44.35.1
      libuuid1-2.28-44.35.1
      libuuid1-32bit-2.28-44.35.1
      libuuid1-debuginfo-2.28-44.35.1
      libuuid1-debuginfo-32bit-2.28-44.35.1
      python-libmount-2.28-44.35.1
      python-libmount-debuginfo-2.28-44.35.1
      python-libmount-debugsource-2.28-44.35.1
      util-linux-2.28-44.35.1
      util-linux-debuginfo-2.28-44.35.1
      util-linux-debugsource-2.28-44.35.1
      util-linux-systemd-2.28-44.35.1
      util-linux-systemd-debuginfo-2.28-44.35.1
      util-linux-systemd-debugsource-2.28-44.35.1
      uuidd-2.28-44.35.1
      uuidd-debuginfo-2.28-44.35.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      util-linux-lang-2.28-44.35.1


References:

   https://www.suse.com/security/cve/CVE-2021-37600.html
   https://bugzilla.suse.com/1038841
   https://bugzilla.suse.com/1081947
   https://bugzilla.suse.com/1082293
   https://bugzilla.suse.com/1084671
   https://bugzilla.suse.com/1085196
   https://bugzilla.suse.com/1106214
   https://bugzilla.suse.com/1116347
   https://bugzilla.suse.com/1122417
   https://bugzilla.suse.com/1125886
   https://bugzilla.suse.com/1135534
   https://bugzilla.suse.com/1135708
   https://bugzilla.suse.com/1151708
   https://bugzilla.suse.com/1168235
   https://bugzilla.suse.com/1168389
   https://bugzilla.suse.com/1169006
   https://bugzilla.suse.com/1172427
   https://bugzilla.suse.com/1174942
   https://bugzilla.suse.com/1175514
   https://bugzilla.suse.com/1175623
   https://bugzilla.suse.com/1178236
   https://bugzilla.suse.com/1178554
   https://bugzilla.suse.com/1178825
   https://bugzilla.suse.com/1188921
   https://bugzilla.suse.com/1194642