Security update for multipath-tools
Announcement ID: | SUSE-SU-2022:3710-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed.
Description:
This update for multipath-tools fixes the following issues:
- CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739)
-
CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
-
multipathd: add "force_reconfigure" option (bsc#1189551) The command "multipathd -kreconfigure" changes behavior: instead of reloading every map, it checks map configuration and reloads only modified maps. This speeds up the reconfigure operation substantially. The old behavior can be reinstated by setting "force_reconfigure yes" in multipath.conf (not recommended). Note: "force_reconfigure yes" is not supported in SLE15-SP4 and beyond, which provide the command "multipathd -k'reconfigure all'"
-
multipathd: avoid stalled clients during reconfigure (bsc#1189551)
- multipathd: handle client disconnect correctly (bsc#1189551)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- multipathd: don't switch to DAEMON_IDLE during startup (bsc#1197570)
- multipathd: disallow changing to/from fpin marginal paths on reconfig
- multipathd handle fpin events (bsc#1195506,jsc#PED-1448)
- multipath: fix exit status of multipath -T (bsc#1191900)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2022-3710=1
-
Basesystem Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3710=1
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-3710=1
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3710=1
-
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3710=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- multipath-tools-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp0_2_0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp0_2_0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debugsource-0.8.5+126+suse.8ce8da5-150300.2.14.1
-
Basesystem Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- multipath-tools-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp0_2_0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp0_2_0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libdmmp-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debugsource-0.8.5+126+suse.8ce8da5-150300.2.14.1
-
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
- multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debugsource-0.8.5+126+suse.8ce8da5-150300.2.14.1
-
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
- multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debugsource-0.8.5+126+suse.8ce8da5-150300.2.14.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
- multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1
- libmpath0-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- kpartx-debuginfo-0.8.5+126+suse.8ce8da5-150300.2.14.1
- multipath-tools-debugsource-0.8.5+126+suse.8ce8da5-150300.2.14.1
References:
- https://www.suse.com/security/cve/CVE-2022-41973.html
- https://www.suse.com/security/cve/CVE-2022-41974.html
- https://bugzilla.suse.com/show_bug.cgi?id=1189551
- https://bugzilla.suse.com/show_bug.cgi?id=1191900
- https://bugzilla.suse.com/show_bug.cgi?id=1195506
- https://bugzilla.suse.com/show_bug.cgi?id=1197570
- https://bugzilla.suse.com/show_bug.cgi?id=1202616
- https://bugzilla.suse.com/show_bug.cgi?id=1202739
- https://jira.suse.com/browse/PED-1448