SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1103-1
Rating:             important
References:         #1038841 #1081947 #1082293 #1084671 #1085196 
                    #1106214 #1116347 #1122417 #1125886 #1135534 
                    #1135708 #1151708 #1168235 #1168389 #1169006 
                    #1172427 #1174942 #1175514 #1175623 #1178236 
                    #1178554 #1178825 #1188921 #1194642 
Cross-References:   CVE-2021-37600
CVSS scores:
                    CVE-2021-37600 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-37600 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

   An update that solves one vulnerability and has 23 fixes is
   now available.

Description:

   This update for util-linux fixes the following issues:

   - Improve throughput and reduce clock sequence increments for high load
     situation with time based version 1 uuids. (bsc#1194642)
   - Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
   - Warn if uuidd lock state is not usable. (bsc#1194642)
   - Fix "su -s" bash completion. (bsc#1172427)
   - CVE-2021-37600: Fixed an integer overflow which could lead to buffer
     overflow in get_sem_elements. (bsc#1188921)
   - Load /etc/default/su (bsc#1116347).
   - Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
   - Do not trim read-only volumes (bsc#1106214).
   - libmount: To prevent incorrect behavior, recognize more pseudofs and
     netfs (bsc#1122417).
   - agetty: Reload issue only if it is really needed (bsc#1085196)
   - agetty: Return previous response of agetty for special characters     (bsc#1085196, bsc#1125886)
   - blockdev: Do not fail --report on kpartx-style partitions on multipath.
     (bsc#1168235)
   - nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
   - Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
   - libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
   - Avoid sulogin failing on not existing or not functional console devices.
     (bsc#1175514)
   - Build with libudev support to support non-root users. (bsc#1169006)
   - lscpu: avoid segfault on PowerPC systems with valid hardware
     configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
   - Fix for warning on mounts to CIFS with mount. (bsc#1174942)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1103=1



Package List:

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      libblkid1-2.28-44.35.1
      libblkid1-32bit-2.28-44.35.1
      libblkid1-debuginfo-2.28-44.35.1
      libblkid1-debuginfo-32bit-2.28-44.35.1
      libfdisk1-2.28-44.35.1
      libfdisk1-debuginfo-2.28-44.35.1
      libmount1-2.28-44.35.1
      libmount1-32bit-2.28-44.35.1
      libmount1-debuginfo-2.28-44.35.1
      libmount1-debuginfo-32bit-2.28-44.35.1
      libsmartcols1-2.28-44.35.1
      libsmartcols1-debuginfo-2.28-44.35.1
      libuuid1-2.28-44.35.1
      libuuid1-32bit-2.28-44.35.1
      libuuid1-debuginfo-2.28-44.35.1
      libuuid1-debuginfo-32bit-2.28-44.35.1
      python-libmount-2.28-44.35.1
      python-libmount-debuginfo-2.28-44.35.1
      python-libmount-debugsource-2.28-44.35.1
      util-linux-2.28-44.35.1
      util-linux-debuginfo-2.28-44.35.1
      util-linux-debugsource-2.28-44.35.1
      util-linux-systemd-2.28-44.35.1
      util-linux-systemd-debuginfo-2.28-44.35.1
      util-linux-systemd-debugsource-2.28-44.35.1
      uuidd-2.28-44.35.1
      uuidd-debuginfo-2.28-44.35.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      util-linux-lang-2.28-44.35.1


References:

   https://www.suse.com/security/cve/CVE-2021-37600.html
   https://bugzilla.suse.com/1038841
   https://bugzilla.suse.com/1081947
   https://bugzilla.suse.com/1082293
   https://bugzilla.suse.com/1084671
   https://bugzilla.suse.com/1085196
   https://bugzilla.suse.com/1106214
   https://bugzilla.suse.com/1116347
   https://bugzilla.suse.com/1122417
   https://bugzilla.suse.com/1125886
   https://bugzilla.suse.com/1135534
   https://bugzilla.suse.com/1135708
   https://bugzilla.suse.com/1151708
   https://bugzilla.suse.com/1168235
   https://bugzilla.suse.com/1168389
   https://bugzilla.suse.com/1169006
   https://bugzilla.suse.com/1172427
   https://bugzilla.suse.com/1174942
   https://bugzilla.suse.com/1175514
   https://bugzilla.suse.com/1175623
   https://bugzilla.suse.com/1178236
   https://bugzilla.suse.com/1178554
   https://bugzilla.suse.com/1178825
   https://bugzilla.suse.com/1188921
   https://bugzilla.suse.com/1194642

SUSE: 2022:1103-1 important: util-linux

April 4, 2022
An update that solves one vulnerability and has 23 fixes is now available

Summary

This update for util-linux fixes the following issues: - Improve throughput and reduce clock sequence increments for high load situation with time based version 1 uuids. (bsc#1194642) - Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642) - Warn if uuidd lock state is not usable. (bsc#1194642) - Fix "su -s" bash completion. (bsc#1172427) - CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921) - Load /etc/default/su (bsc#1116347). - Prevent outdated pam files (bsc#1082293, bsc#1081947#c68). - Do not trim read-only volumes (bsc#1106214). - libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417). - agetty: Reload issue only if it is really needed (bsc#1085196) - agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886) - blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235) - nologin: Add support for -c to prevent error from su -c. (bsc#1151708) - Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389) - libblkid: Do not trigger CDROM autoclose. (bsc#1084671) - Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514) - Build with libudev support to support non-root users. (bsc#1169006) - lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825) - Fix for warning on mounts to CIFS with mount. (bsc#1174942) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1103=1 Package List: - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libblkid1-2.28-44.35.1 libblkid1-32bit-2.28-44.35.1 libblkid1-debuginfo-2.28-44.35.1 libblkid1-debuginfo-32bit-2.28-44.35.1 libfdisk1-2.28-44.35.1 libfdisk1-debuginfo-2.28-44.35.1 libmount1-2.28-44.35.1 libmount1-32bit-2.28-44.35.1 libmount1-debuginfo-2.28-44.35.1 libmount1-debuginfo-32bit-2.28-44.35.1 libsmartcols1-2.28-44.35.1 libsmartcols1-debuginfo-2.28-44.35.1 libuuid1-2.28-44.35.1 libuuid1-32bit-2.28-44.35.1 libuuid1-debuginfo-2.28-44.35.1 libuuid1-debuginfo-32bit-2.28-44.35.1 python-libmount-2.28-44.35.1 python-libmount-debuginfo-2.28-44.35.1 python-libmount-debugsource-2.28-44.35.1 util-linux-2.28-44.35.1 util-linux-debuginfo-2.28-44.35.1 util-linux-debugsource-2.28-44.35.1 util-linux-systemd-2.28-44.35.1 util-linux-systemd-debuginfo-2.28-44.35.1 util-linux-systemd-debugsource-2.28-44.35.1 uuidd-2.28-44.35.1 uuidd-debuginfo-2.28-44.35.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): util-linux-lang-2.28-44.35.1

References

#1038841 #1081947 #1082293 #1084671 #1085196

#1106214 #1116347 #1122417 #1125886 #1135534

#1135708 #1151708 #1168235 #1168389 #1169006

#1172427 #1174942 #1175514 #1175623 #1178236

#1178554 #1178825 #1188921 #1194642

Cross- CVE-2021-37600

CVSS scores:

CVE-2021-37600 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2021-37600 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Server 12-SP2-BCL

https://www.suse.com/security/cve/CVE-2021-37600.html

https://bugzilla.suse.com/1038841

https://bugzilla.suse.com/1081947

https://bugzilla.suse.com/1082293

https://bugzilla.suse.com/1084671

https://bugzilla.suse.com/1085196

https://bugzilla.suse.com/1106214

https://bugzilla.suse.com/1116347

https://bugzilla.suse.com/1122417

https://bugzilla.suse.com/1125886

https://bugzilla.suse.com/1135534

https://bugzilla.suse.com/1135708

https://bugzilla.suse.com/1151708

https://bugzilla.suse.com/1168235

https://bugzilla.suse.com/1168389

https://bugzilla.suse.com/1169006

https://bugzilla.suse.com/1172427

https://bugzilla.suse.com/1174942

https://bugzilla.suse.com/1175514

https://bugzilla.suse.com/1175623

https://bugzilla.suse.com/1178236

https://bugzilla.suse.com/1178554

https://bugzilla.suse.com/1178825

https://bugzilla.suse.com/1188921

https://bugzilla.suse.com/1194642

Severity
Announcement ID: SUSE-SU-2022:1103-1
Rating: important

Related News