Security update for multipath-tools
Announcement ID: | SUSE-SU-2022:3711-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has six security fixes can now be installed.
Description:
This update for multipath-tools fixes the following issues:
- CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739)
- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- libmultipath: fix find_multipaths_timeout for unknown hardware (bsc#1201483)
- multipath-tools: fix "multipath -ll" for Native NVME Multipath devices (bsc#1201483)
- multipathd: don't switch to DAEMON_IDLE during startup (bsc#1199346, bsc#1197570)
- multipathd: avoid delays during uevent processing (bsc#1199347)
- multipathd: Don't keep starting TUR threads, if they always hang. (bsc#1199345)
- Fix busy loop with delayed_reconfigure (bsc#1199342)
- multipath.conf: add support for "protocol" subsection in "overrides" section to set certain config options by protocol.
- Removed the previously deprecated options getuid_callout, config_dir, multipath_dir, pg_timeout
- Add disclaimer about vendor support
- Change built-in defaults for NVMe: group by prio, and immediate failback
- Fixes for minor issues reported by coverity
- Fix for memory leak with uid_attrs
- Updates for built in hardware db
- Logging improvements
- multipathd: use remove_map_callback for delayed reconfigure
- Fix handling of path addition in read-only arrays on NVMe
- Updates of built-in hardware database
- libmultipath: only warn once about unsupported dev_loss_tmo
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2022-3711=1
-
SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3711=1
-
SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3711=1
-
Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3711=1
Package List:
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
- multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
-
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
- multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
-
Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
- multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
- libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
- libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
References:
- https://www.suse.com/security/cve/CVE-2022-41973.html
- https://www.suse.com/security/cve/CVE-2022-41974.html
- https://bugzilla.suse.com/show_bug.cgi?id=1197570
- https://bugzilla.suse.com/show_bug.cgi?id=1199342
- https://bugzilla.suse.com/show_bug.cgi?id=1199345
- https://bugzilla.suse.com/show_bug.cgi?id=1199346
- https://bugzilla.suse.com/show_bug.cgi?id=1199347
- https://bugzilla.suse.com/show_bug.cgi?id=1201483
- https://bugzilla.suse.com/show_bug.cgi?id=1202616
- https://bugzilla.suse.com/show_bug.cgi?id=1202739