SUSE: 2022:1103-1 important: util-linux
Summary
This update for util-linux fixes the following issues: - Improve throughput and reduce clock sequence increments for high load situation with time based version 1 uuids. (bsc#1194642) - Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642) - Warn if uuidd lock state is not usable. (bsc#1194642) - Fix "su -s" bash completion. (bsc#1172427) - CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921) - Load /etc/default/su (bsc#1116347). - Prevent outdated pam files (bsc#1082293, bsc#1081947#c68). - Do not trim read-only volumes (bsc#1106214). - libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417). - agetty: Reload issue only if it is really needed (bsc#1085196) - agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886) - blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235) - nologin: Add support for -c to prevent error from su -c. (bsc#1151708) - Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389) - libblkid: Do not trigger CDROM autoclose. (bsc#1084671) - Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514) - Build with libudev support to support non-root users. (bsc#1169006) - lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825) - Fix for warning on mounts to CIFS with mount. (bsc#1174942) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1103=1 Package List: - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libblkid1-2.28-44.35.1 libblkid1-32bit-2.28-44.35.1 libblkid1-debuginfo-2.28-44.35.1 libblkid1-debuginfo-32bit-2.28-44.35.1 libfdisk1-2.28-44.35.1 libfdisk1-debuginfo-2.28-44.35.1 libmount1-2.28-44.35.1 libmount1-32bit-2.28-44.35.1 libmount1-debuginfo-2.28-44.35.1 libmount1-debuginfo-32bit-2.28-44.35.1 libsmartcols1-2.28-44.35.1 libsmartcols1-debuginfo-2.28-44.35.1 libuuid1-2.28-44.35.1 libuuid1-32bit-2.28-44.35.1 libuuid1-debuginfo-2.28-44.35.1 libuuid1-debuginfo-32bit-2.28-44.35.1 python-libmount-2.28-44.35.1 python-libmount-debuginfo-2.28-44.35.1 python-libmount-debugsource-2.28-44.35.1 util-linux-2.28-44.35.1 util-linux-debuginfo-2.28-44.35.1 util-linux-debugsource-2.28-44.35.1 util-linux-systemd-2.28-44.35.1 util-linux-systemd-debuginfo-2.28-44.35.1 util-linux-systemd-debugsource-2.28-44.35.1 uuidd-2.28-44.35.1 uuidd-debuginfo-2.28-44.35.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): util-linux-lang-2.28-44.35.1
References
#1038841 #1081947 #1082293 #1084671 #1085196
#1106214 #1116347 #1122417 #1125886 #1135534
#1135708 #1151708 #1168235 #1168389 #1169006
#1172427 #1174942 #1175514 #1175623 #1178236
#1178554 #1178825 #1188921 #1194642
Cross- CVE-2021-37600
CVSS scores:
CVE-2021-37600 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37600 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Server 12-SP2-BCL
https://www.suse.com/security/cve/CVE-2021-37600.html
https://bugzilla.suse.com/1038841
https://bugzilla.suse.com/1081947
https://bugzilla.suse.com/1082293
https://bugzilla.suse.com/1084671
https://bugzilla.suse.com/1085196
https://bugzilla.suse.com/1106214
https://bugzilla.suse.com/1116347
https://bugzilla.suse.com/1122417
https://bugzilla.suse.com/1125886
https://bugzilla.suse.com/1135534
https://bugzilla.suse.com/1135708
https://bugzilla.suse.com/1151708
https://bugzilla.suse.com/1168235
https://bugzilla.suse.com/1168389
https://bugzilla.suse.com/1169006
https://bugzilla.suse.com/1172427
https://bugzilla.suse.com/1174942
https://bugzilla.suse.com/1175514
https://bugzilla.suse.com/1175623
https://bugzilla.suse.com/1178236
https://bugzilla.suse.com/1178554
https://bugzilla.suse.com/1178825
https://bugzilla.suse.com/1188921
https://bugzilla.suse.com/1194642