QID 751254
Date Published: 2021-11-22
QID 751254: SUSE Enterprise Linux Security Update for util-linux (SUSE-SU-2021:3463-1)
This update for util-linux fixes the following issues: - cve-2021-37600: fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (
Bsc#1188921) - prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- do not trim read-only volumes (bsc#1106214).
- libmount: to prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: add remainafterexit=yes (bsc#1135534).
- agetty: reload issue only if it is really needed (bsc#1085196) - agetty: return previous response of agetty for special characters (bsc#1085196, bsc#1125886) - blockdev: do not fail --report on kpartx-style partitions on multipath.
(bsc#1168235) - nologin: add support for -c to prevent error from su -c. (
Bsc#1151708) - avoid triggering autofs in lookup_umount_fs_by_statfs. (
Bsc#1168389) - libblkid: do not trigger cdrom autoclose. (
Bsc#1084671) - avoid sulogin failing on not existing or not functional console devices.
(bsc#1175514) - build with libudev support to support non-root users. (
Bsc#1169006) - lscpu: avoid segfault on powerpc systems with valid hardware configurations. (
Bsc#1175623, bsc#1178554, bsc#1178825) - fix for warning on mounts to cifs with mount. (
Sg#57988, bsc#1174942)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:3463-1 -
lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html
CVEs related to QID 751254
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:3463-1 | SUSE Enterprise Linux |
|