SUSE-SU-2022:3711-1: important: Security update for multipath-tools

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Oct 24 19:21:05 UTC 2022


   SUSE Security Update: Security update for multipath-tools
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3711-1
Rating:             important
References:         #1197570 #1199342 #1199345 #1199346 #1199347 
                    #1201483 #1202616 #1202739 
Cross-References:   CVE-2022-41973 CVE-2022-41974
CVSS scores:
                    CVE-2022-41973 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
                    CVE-2022-41974 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Micro 5.3
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.3
                    SUSE Manager Retail Branch Server 4.3
                    SUSE Manager Server 4.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that solves two vulnerabilities and has 6 fixes
   is now available.

Description:

   This update for multipath-tools fixes the following issues:

   - CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739)
   - CVE-2022-41974: Fixed an authorization bypass issue in multipathd.
     (bsc#1202739)
   - Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
   - libmultipath: fix find_multipaths_timeout for unknown hardware
     (bsc#1201483)
   - multipath-tools: fix "multipath -ll" for Native NVME Multipath devices
     (bsc#1201483)
   - multipathd: don't switch to DAEMON_IDLE during startup (bsc#1199346,
     bsc#1197570)
   - multipathd: avoid delays during uevent processing (bsc#1199347)
   - multipathd: Don't keep starting TUR threads, if they always hang.
     (bsc#1199345)
   - Fix busy loop with delayed_reconfigure (bsc#1199342)
   - multipath.conf: add support for "protocol" subsection in "overrides"
     section to set certain config options by protocol.
   - Removed the previously deprecated options getuid_callout, config_dir,
     multipath_dir, pg_timeout
   - Add disclaimer about vendor support
   - Change built-in defaults for NVMe: group by prio, and immediate failback
   - Fixes for minor issues reported by coverity
   - Fix for memory leak with uid_attrs
   - Updates for built in hardware db
   - Logging improvements
   - multipathd: use remove_map_callback for delayed reconfigure
   - Fix handling of path addition in read-only arrays on NVMe
   - Updates of built-in hardware database
   - libmultipath: only warn once about unsupported dev_loss_tmo


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-3711=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3711=1

   - SUSE Linux Enterprise Micro 5.3:

      zypper in -t patch SUSE-SLE-Micro-5.3-2022-3711=1



Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1

   - SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1


References:

   https://www.suse.com/security/cve/CVE-2022-41973.html
   https://www.suse.com/security/cve/CVE-2022-41974.html
   https://bugzilla.suse.com/1197570
   https://bugzilla.suse.com/1199342
   https://bugzilla.suse.com/1199345
   https://bugzilla.suse.com/1199346
   https://bugzilla.suse.com/1199347
   https://bugzilla.suse.com/1201483
   https://bugzilla.suse.com/1202616
   https://bugzilla.suse.com/1202739



More information about the sle-security-updates mailing list