Security update for util-linux and shadow
Announcement ID: | SUSE-SU-2019:2307-1 |
---|---|
Rating: | moderate |
References: | |
Affected Products: |
|
An update that has 12 security fixes can now be installed.
Description:
This update for util-linux and shadow fixes the following issues:
util-linux:
- Fixed an issue where PATH settings in /etc/default/su being ignored (bsc#1121197)
- Prevent outdated pam files (bsc#1082293).
- De-duplicate fstrim -A properly (bsc#1127701).
- Do not trim read-only volumes (bsc#1106214).
- Integrate pam_keyinit pam module to login (bsc#1081947).
- Perform one-time reset of /etc/default/su (bsc#1121197).
- Fix problems in reading of login.defs values (bsc#1121197)
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- libmount: print a blacklist hint for "unknown filesystem type" (jsc#SUSE-4085, fate#326832)
- Fix /etc/default/su comments and create /etc/default/runuser (bsc#1121197).
shadow:
- Fixed an issue where PATH settings in /etc/default/su being ignored (bsc#1121197)
- Fix segfault in useradd during setting password inactivity period. (bsc#1141113)
- Hardening for su wrappers (bsc#353876)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-2307=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2307=1
Package List:
-
Basesystem Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- libfdisk-devel-2.33.1-4.5.1
- util-linux-systemd-debuginfo-2.33.1-4.5.1
- libuuid1-2.33.1-4.5.1
- libmount1-2.33.1-4.5.1
- libfdisk1-debuginfo-2.33.1-4.5.1
- libsmartcols-devel-2.33.1-4.5.1
- libblkid-devel-static-2.33.1-4.5.1
- util-linux-debuginfo-2.33.1-4.5.1
- shadow-debuginfo-4.6-3.5.6
- util-linux-debugsource-2.33.1-4.5.1
- util-linux-systemd-2.33.1-4.5.1
- libuuid-devel-2.33.1-4.5.1
- libmount1-debuginfo-2.33.1-4.5.1
- libuuid-devel-static-2.33.1-4.5.1
- libblkid1-debuginfo-2.33.1-4.5.1
- libblkid1-2.33.1-4.5.1
- libsmartcols1-2.33.1-4.5.1
- libblkid-devel-2.33.1-4.5.1
- libuuid1-debuginfo-2.33.1-4.5.1
- util-linux-systemd-debugsource-2.33.1-4.5.1
- shadow-debugsource-4.6-3.5.6
- shadow-4.6-3.5.6
- libfdisk1-2.33.1-4.5.1
- libsmartcols1-debuginfo-2.33.1-4.5.1
- libmount-devel-2.33.1-4.5.1
- util-linux-2.33.1-4.5.1
-
Basesystem Module 15-SP1 (noarch)
- util-linux-lang-2.33.1-4.5.1
-
Basesystem Module 15-SP1 (x86_64)
- libblkid1-32bit-2.33.1-4.5.1
- libmount1-32bit-2.33.1-4.5.1
- libuuid1-32bit-2.33.1-4.5.1
- libuuid1-32bit-debuginfo-2.33.1-4.5.1
- libblkid1-32bit-debuginfo-2.33.1-4.5.1
- libmount1-32bit-debuginfo-2.33.1-4.5.1
-
Server Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- uuidd-2.33.1-4.5.1
- util-linux-systemd-debuginfo-2.33.1-4.5.1
- util-linux-systemd-debugsource-2.33.1-4.5.1
- uuidd-debuginfo-2.33.1-4.5.1
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1081947
- https://bugzilla.suse.com/show_bug.cgi?id=1082293
- https://bugzilla.suse.com/show_bug.cgi?id=1085196
- https://bugzilla.suse.com/show_bug.cgi?id=1106214
- https://bugzilla.suse.com/show_bug.cgi?id=1121197
- https://bugzilla.suse.com/show_bug.cgi?id=1122417
- https://bugzilla.suse.com/show_bug.cgi?id=1125886
- https://bugzilla.suse.com/show_bug.cgi?id=1127701
- https://bugzilla.suse.com/show_bug.cgi?id=1135534
- https://bugzilla.suse.com/show_bug.cgi?id=1135708
- https://bugzilla.suse.com/show_bug.cgi?id=1141113
- https://bugzilla.suse.com/show_bug.cgi?id=353876