Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in util-linux
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in util-linux
ID: SUSE-SU-2022:1103-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 12-SP2-BCL
Datum: Mo, 4. April 2022, 21:58
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
Applikationen: util-linux

Originalnachricht


SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID: SUSE-SU-2022:1103-1
Rating: important
References: #1038841 #1081947 #1082293 #1084671 #1085196
#1106214 #1116347 #1122417 #1125886 #1135534
#1135708 #1151708 #1168235 #1168389 #1169006
#1172427 #1174942 #1175514 #1175623 #1178236
#1178554 #1178825 #1188921 #1194642
Cross-References: CVE-2021-37600
CVSS scores:
CVE-2021-37600 (NVD) : 5.5
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37600 (SUSE): 5.5
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:
SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

An update that solves one vulnerability and has 23 fixes is
now available.

Description:

This update for util-linux fixes the following issues:

- Improve throughput and reduce clock sequence increments for high load
situation with time based version 1 uuids. (bsc#1194642)
- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
- Warn if uuidd lock state is not usable. (bsc#1194642)
- Fix "su -s" bash completion. (bsc#1172427)
- CVE-2021-37600: Fixed an integer overflow which could lead to buffer
overflow in get_sem_elements. (bsc#1188921)
- Load /etc/default/su (bsc#1116347).
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and
netfs (bsc#1122417).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters
(bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath.
(bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices.
(bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware
configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (bsc#1174942)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 12-SP2-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1103=1



Package List:

- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

libblkid1-2.28-44.35.1
libblkid1-32bit-2.28-44.35.1
libblkid1-debuginfo-2.28-44.35.1
libblkid1-debuginfo-32bit-2.28-44.35.1
libfdisk1-2.28-44.35.1
libfdisk1-debuginfo-2.28-44.35.1
libmount1-2.28-44.35.1
libmount1-32bit-2.28-44.35.1
libmount1-debuginfo-2.28-44.35.1
libmount1-debuginfo-32bit-2.28-44.35.1
libsmartcols1-2.28-44.35.1
libsmartcols1-debuginfo-2.28-44.35.1
libuuid1-2.28-44.35.1
libuuid1-32bit-2.28-44.35.1
libuuid1-debuginfo-2.28-44.35.1
libuuid1-debuginfo-32bit-2.28-44.35.1
python-libmount-2.28-44.35.1
python-libmount-debuginfo-2.28-44.35.1
python-libmount-debugsource-2.28-44.35.1
util-linux-2.28-44.35.1
util-linux-debuginfo-2.28-44.35.1
util-linux-debugsource-2.28-44.35.1
util-linux-systemd-2.28-44.35.1
util-linux-systemd-debuginfo-2.28-44.35.1
util-linux-systemd-debugsource-2.28-44.35.1
uuidd-2.28-44.35.1
uuidd-debuginfo-2.28-44.35.1

- SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

util-linux-lang-2.28-44.35.1


References:

https://www.suse.com/security/cve/CVE-2021-37600.html
https://bugzilla.suse.com/1038841
https://bugzilla.suse.com/1081947
https://bugzilla.suse.com/1082293
https://bugzilla.suse.com/1084671
https://bugzilla.suse.com/1085196
https://bugzilla.suse.com/1106214
https://bugzilla.suse.com/1116347
https://bugzilla.suse.com/1122417
https://bugzilla.suse.com/1125886
https://bugzilla.suse.com/1135534
https://bugzilla.suse.com/1135708
https://bugzilla.suse.com/1151708
https://bugzilla.suse.com/1168235
https://bugzilla.suse.com/1168389
https://bugzilla.suse.com/1169006
https://bugzilla.suse.com/1172427
https://bugzilla.suse.com/1174942
https://bugzilla.suse.com/1175514
https://bugzilla.suse.com/1175623
https://bugzilla.suse.com/1178236
https://bugzilla.suse.com/1178554
https://bugzilla.suse.com/1178825
https://bugzilla.suse.com/1188921
https://bugzilla.suse.com/1194642
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung