You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa util-linux

Sigurnosni nedostaci programskog paketa util-linux

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:0555-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1023041
Cross-References: CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

An update that solves one vulnerability and has 5 fixes is
now available.

Description:

This update for util-linux fixes the following issues:

This security issue was fixed:

– CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).

This non-security issues were fixed:

– lscpu: Implement WSL detection and work around crash (bsc#1019332)
– fstrim: De-duplicate btrfs sub-volumes for “fstrim -a” and bind mounts
(bsc#1020077)
– Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
– Disable ro checks for mtab (bsc#1012632)
– Ensure that the option “users,exec,dev,suid” work as expected on NFS
mounts (bsc#1008965)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Workstation Extension 12-SP1:

zypper in -t patch SUSE-SLE-WE-12-SP1-2017-291=1

– SUSE Linux Enterprise Software Development Kit 12-SP1:

zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-291=1

– SUSE Linux Enterprise Server 12-SP1:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-291=1

– SUSE Linux Enterprise Desktop 12-SP1:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-291=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

libuuid-devel-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1

– SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

libblkid-devel-2.25-40.1
libmount-devel-2.25-40.1
libsmartcols-devel-2.25-40.1
libuuid-devel-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1

– SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

libblkid1-2.25-40.1
libblkid1-debuginfo-2.25-40.1
libmount1-2.25-40.1
libmount1-debuginfo-2.25-40.1
libsmartcols1-2.25-40.1
libsmartcols1-debuginfo-2.25-40.1
libuuid1-2.25-40.1
libuuid1-debuginfo-2.25-40.1
python-libmount-2.25-40.2
python-libmount-debuginfo-2.25-40.2
python-libmount-debugsource-2.25-40.2
util-linux-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
util-linux-systemd-2.25-40.1
util-linux-systemd-debuginfo-2.25-40.1
util-linux-systemd-debugsource-2.25-40.1
uuidd-2.25-40.1
uuidd-debuginfo-2.25-40.1

– SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):

libblkid1-32bit-2.25-40.1
libblkid1-debuginfo-32bit-2.25-40.1
libmount1-32bit-2.25-40.1
libmount1-debuginfo-32bit-2.25-40.1
libuuid1-32bit-2.25-40.1
libuuid1-debuginfo-32bit-2.25-40.1

– SUSE Linux Enterprise Server 12-SP1 (noarch):

util-linux-lang-2.25-40.1

– SUSE Linux Enterprise Desktop 12-SP1 (noarch):

util-linux-lang-2.25-40.1

– SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

libblkid1-2.25-40.1
libblkid1-32bit-2.25-40.1
libblkid1-debuginfo-2.25-40.1
libblkid1-debuginfo-32bit-2.25-40.1
libmount1-2.25-40.1
libmount1-32bit-2.25-40.1
libmount1-debuginfo-2.25-40.1
libmount1-debuginfo-32bit-2.25-40.1
libsmartcols1-2.25-40.1
libsmartcols1-debuginfo-2.25-40.1
libuuid-devel-2.25-40.1
libuuid1-2.25-40.1
libuuid1-32bit-2.25-40.1
libuuid1-debuginfo-2.25-40.1
libuuid1-debuginfo-32bit-2.25-40.1
python-libmount-2.25-40.2
python-libmount-debuginfo-2.25-40.2
python-libmount-debugsource-2.25-40.2
util-linux-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
util-linux-systemd-2.25-40.1
util-linux-systemd-debuginfo-2.25-40.1
util-linux-systemd-debugsource-2.25-40.1
uuidd-2.25-40.1
uuidd-debuginfo-2.25-40.1

References:

https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1023041


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:0554-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1020985 #1023041
Cross-References: CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that solves one vulnerability and has 6 fixes is
now available.

Description:

This update for util-linux fixes the following issues:

This security issue was fixed:

– CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).

This non-security issues were fixed:

– lscpu: Implement WSL detection and work around crash (bsc#1019332)
– fstrim: De-duplicate btrfs sub-volumes for “fstrim -a” and bind mounts
(bsc#1020077)
– Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
– Disable ro checks for mtab (bsc#1012632)
– Ensure that the option “users,exec,dev,suid” work as expected on NFS
mounts (bsc#1008965)
– Fix empty slave detection to prevent 100% CPU load in some cases
(bsc#1020985)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Workstation Extension 12-SP2:

zypper in -t patch SUSE-SLE-WE-12-SP2-2017-292=1

– SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-292=1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-292=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-292=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-292=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

libuuid-devel-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1

– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

libblkid-devel-2.28-44.3.1
libmount-devel-2.28-44.3.1
libsmartcols-devel-2.28-44.3.1
libuuid-devel-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

libblkid1-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

util-linux-lang-2.28-44.3.1

– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

libblkid1-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3

– SUSE Linux Enterprise Server 12-SP2 (x86_64):

libblkid1-32bit-2.28-44.3.1
libblkid1-debuginfo-32bit-2.28-44.3.1
libmount1-32bit-2.28-44.3.1
libmount1-debuginfo-32bit-2.28-44.3.1
libuuid1-32bit-2.28-44.3.1
libuuid1-debuginfo-32bit-2.28-44.3.1

– SUSE Linux Enterprise Server 12-SP2 (noarch):

util-linux-lang-2.28-44.3.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

libblkid1-2.28-44.3.1
libblkid1-32bit-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libblkid1-debuginfo-32bit-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-32bit-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libmount1-debuginfo-32bit-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid-devel-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-32bit-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
libuuid1-debuginfo-32bit-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3

– SUSE Linux Enterprise Desktop 12-SP2 (noarch):

util-linux-lang-2.28-44.3.1

References:

https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1020985
https://bugzilla.suse.com/1023041


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for util-linux
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:0553-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1023041 #947494 #966891 #978993 #982331
#983164 #987176 #988361
Cross-References: CVE-2016-5011 CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that solves two vulnerabilities and has 11 fixes
is now available.

Description:

This update for util-linux fixes a number of bugs and two security issues.

The following security bugs were fixed:

– CVE-2016-5011: Infinite loop DoS in libblkid while parsing DOS partition
(bsc#988361)
– CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).

The following non-security bugs were fixed:

– bsc#1008965: Ensure that the option “users,exec,dev,suid” work as
expected on NFS mounts
– bsc#1012504: Fix regressions in safe loop re-use patch set for libmount
– bsc#1012632: Disable ro checks for mtab
– bsc#1020077: fstrim: De-duplicate btrfs sub-volumes for “fstrim -a” and
bind mounts
– bsc#947494: mount -a would fail to recognize btrfs already mounted,
address loop re-use in libmount
– bsc#966891: Conflict in meaning of losetup -L. This switch in SLE12 SP1
and SP2 continues to carry the meaning of –logical-blocksize instead of
upstream –nooverlap
– bsc#978993: cfdisk would mangle some text output
– bsc#982331: libmount: ignore redundant slashes
– bsc#983164: mount uid= and gid= would reject valid non UID/GID values
– bsc#987176: When mounting a subfolder of a CIFS share, mount -a would
show the mount as busy
– bsc#1019332: lscpu: Implement WSL detection and work around crash

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-290=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-290=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

libblkid1-2.25-24.10.1
libblkid1-32bit-2.25-24.10.1
libblkid1-debuginfo-2.25-24.10.1
libblkid1-debuginfo-32bit-2.25-24.10.1
libmount1-2.25-24.10.1
libmount1-32bit-2.25-24.10.1
libmount1-debuginfo-2.25-24.10.1
libmount1-debuginfo-32bit-2.25-24.10.1
libsmartcols1-2.25-24.10.1
libsmartcols1-debuginfo-2.25-24.10.1
libuuid1-2.25-24.10.1
libuuid1-32bit-2.25-24.10.1
libuuid1-debuginfo-2.25-24.10.1
libuuid1-debuginfo-32bit-2.25-24.10.1
python-libmount-2.25-24.10.3
python-libmount-debuginfo-2.25-24.10.3
python-libmount-debugsource-2.25-24.10.3
util-linux-2.25-24.10.1
util-linux-debuginfo-2.25-24.10.1
util-linux-debugsource-2.25-24.10.1
util-linux-systemd-2.25-24.10.1
util-linux-systemd-debuginfo-2.25-24.10.1
util-linux-systemd-debugsource-2.25-24.10.1
uuidd-2.25-24.10.1
uuidd-debuginfo-2.25-24.10.1

– SUSE Linux Enterprise Server for SAP 12 (noarch):

util-linux-lang-2.25-24.10.1

– SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

libblkid1-2.25-24.10.1
libblkid1-debuginfo-2.25-24.10.1
libmount1-2.25-24.10.1
libmount1-debuginfo-2.25-24.10.1
libsmartcols1-2.25-24.10.1
libsmartcols1-debuginfo-2.25-24.10.1
libuuid1-2.25-24.10.1
libuuid1-debuginfo-2.25-24.10.1
python-libmount-2.25-24.10.3
python-libmount-debuginfo-2.25-24.10.3
python-libmount-debugsource-2.25-24.10.3
util-linux-2.25-24.10.1
util-linux-debuginfo-2.25-24.10.1
util-linux-debugsource-2.25-24.10.1
util-linux-systemd-2.25-24.10.1
util-linux-systemd-debuginfo-2.25-24.10.1
util-linux-systemd-debugsource-2.25-24.10.1
uuidd-2.25-24.10.1
uuidd-debuginfo-2.25-24.10.1

– SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):

libblkid1-32bit-2.25-24.10.1
libblkid1-debuginfo-32bit-2.25-24.10.1
libmount1-32bit-2.25-24.10.1
libmount1-debuginfo-32bit-2.25-24.10.1
libuuid1-32bit-2.25-24.10.1
libuuid1-debuginfo-32bit-2.25-24.10.1

– SUSE Linux Enterprise Server 12-LTSS (noarch):

util-linux-lang-2.25-24.10.1

References:

https://www.suse.com/security/cve/CVE-2016-5011.html
https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1023041
https://bugzilla.suse.com/947494
https://bugzilla.suse.com/966891
https://bugzilla.suse.com/978993
https://bugzilla.suse.com/982331
https://bugzilla.suse.com/983164
https://bugzilla.suse.com/987176
https://bugzilla.suse.com/988361


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorVlatka Misic
Cert idNCERT-REF-2017-02-0179-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak u programskom paketu kernel za operacijski sustav Redhat. Otkriveni nedostatak posljedica je pristupa prethodno oslobođenoj radnoj...

Close