SUSE-SU-2019:2307-1: moderate: Security update for util-linux and shadow
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Sep 5 10:14:01 MDT 2019
SUSE Security Update: Security update for util-linux and shadow
______________________________________________________________________________
Announcement ID: SUSE-SU-2019:2307-1
Rating: moderate
References: #1081947 #1082293 #1085196 #1106214 #1121197
#1122417 #1125886 #1127701 #1135534 #1135708
#1141113 #353876
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for util-linux and shadow fixes the following issues:
util-linux:
- Fixed an issue where PATH settings in /etc/default/su being ignored
(bsc#1121197)
- Prevent outdated pam files (bsc#1082293).
- De-duplicate fstrim -A properly (bsc#1127701).
- Do not trim read-only volumes (bsc#1106214).
- Integrate pam_keyinit pam module to login (bsc#1081947).
- Perform one-time reset of /etc/default/su (bsc#1121197).
- Fix problems in reading of login.defs values (bsc#1121197)
- libmount: To prevent incorrect behavior, recognize more pseudofs and
netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Return previous response of agetty for special characters
(bsc#1085196, bsc#1125886)
- libmount: print a blacklist hint for "unknown filesystem type"
(jsc#SUSE-4085, fate#326832)
- Fix /etc/default/su comments and create /etc/default/runuser
(bsc#1121197).
shadow:
- Fixed an issue where PATH settings in /etc/default/su being ignored
(bsc#1121197)
- Fix segfault in useradd during setting password inactivity period.
(bsc#1141113)
- Hardening for su wrappers (bsc#353876)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Server Applications 15-SP1:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2307=1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:
zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2307=1
- SUSE Linux Enterprise Module for Basesystem 15-SP1:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-2307=1
Package List:
- SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le s390x x86_64):
util-linux-systemd-debuginfo-2.33.1-4.5.1
util-linux-systemd-debugsource-2.33.1-4.5.1
uuidd-2.33.1-4.5.1
uuidd-debuginfo-2.33.1-4.5.1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64):
libfdisk-devel-static-2.33.1-4.5.1
libmount-devel-static-2.33.1-4.5.1
libsmartcols-devel-static-2.33.1-4.5.1
python3-libmount-2.33.1-4.5.1
python3-libmount-debuginfo-2.33.1-4.5.1
python3-libmount-debugsource-2.33.1-4.5.1
util-linux-debuginfo-2.33.1-4.5.1
util-linux-debugsource-2.33.1-4.5.1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (x86_64):
libblkid-devel-32bit-2.33.1-4.5.1
libmount-devel-32bit-2.33.1-4.5.1
libuuid-devel-32bit-2.33.1-4.5.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):
libblkid-devel-2.33.1-4.5.1
libblkid-devel-static-2.33.1-4.5.1
libblkid1-2.33.1-4.5.1
libblkid1-debuginfo-2.33.1-4.5.1
libfdisk-devel-2.33.1-4.5.1
libfdisk1-2.33.1-4.5.1
libfdisk1-debuginfo-2.33.1-4.5.1
libmount-devel-2.33.1-4.5.1
libmount1-2.33.1-4.5.1
libmount1-debuginfo-2.33.1-4.5.1
libsmartcols-devel-2.33.1-4.5.1
libsmartcols1-2.33.1-4.5.1
libsmartcols1-debuginfo-2.33.1-4.5.1
libuuid-devel-2.33.1-4.5.1
libuuid-devel-static-2.33.1-4.5.1
libuuid1-2.33.1-4.5.1
libuuid1-debuginfo-2.33.1-4.5.1
shadow-4.6-3.5.6
shadow-debuginfo-4.6-3.5.6
shadow-debugsource-4.6-3.5.6
util-linux-2.33.1-4.5.1
util-linux-debuginfo-2.33.1-4.5.1
util-linux-debugsource-2.33.1-4.5.1
util-linux-systemd-2.33.1-4.5.1
util-linux-systemd-debuginfo-2.33.1-4.5.1
util-linux-systemd-debugsource-2.33.1-4.5.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch):
util-linux-lang-2.33.1-4.5.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (x86_64):
libblkid1-32bit-2.33.1-4.5.1
libblkid1-32bit-debuginfo-2.33.1-4.5.1
libmount1-32bit-2.33.1-4.5.1
libmount1-32bit-debuginfo-2.33.1-4.5.1
libuuid1-32bit-2.33.1-4.5.1
libuuid1-32bit-debuginfo-2.33.1-4.5.1
References:
https://bugzilla.suse.com/1081947
https://bugzilla.suse.com/1082293
https://bugzilla.suse.com/1085196
https://bugzilla.suse.com/1106214
https://bugzilla.suse.com/1121197
https://bugzilla.suse.com/1122417
https://bugzilla.suse.com/1125886
https://bugzilla.suse.com/1127701
https://bugzilla.suse.com/1135534
https://bugzilla.suse.com/1135708
https://bugzilla.suse.com/1141113
https://bugzilla.suse.com/353876
More information about the sle-security-updates
mailing list