SUSE SLES12 Security Update : util-linux (SUSE-SU-2017:0553-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for util-linux fixes a number of bugs and two security
issues. The following security bugs were fixed :

- CVE-2016-5011: Infinite loop DoS in libblkid while
parsing DOS partition (bsc#988361)

- CVE-2017-2616: In su with PAM support it was possible
for local users to send SIGKILL to selected other
processes with root privileges (bsc#1023041). The
following non-security bugs were fixed :

- bsc#1008965: Ensure that the option
'users,exec,dev,suid' work as expected on NFS mounts

- bsc#1012504: Fix regressions in safe loop re-use patch
set for libmount

- bsc#1012632: Disable ro checks for mtab

- bsc#1020077: fstrim: De-duplicate btrfs sub-volumes for
'fstrim -a' and bind mounts

- bsc#947494: mount -a would fail to recognize btrfs
already mounted, address loop re-use in libmount

- bsc#966891: Conflict in meaning of losetup -L. This
switch in SLE12 SP1 and SP2 continues to carry the
meaning of --logical-blocksize instead of upstream
--nooverlap

- bsc#978993: cfdisk would mangle some text output

- bsc#982331: libmount: ignore redundant slashes

- bsc#983164: mount uid= and gid= would reject valid non
UID/GID values

- bsc#987176: When mounting a subfolder of a CIFS share,
mount -a would show the mount as busy

- bsc#1019332: lscpu: Implement WSL detection and work
around crash

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1023041
https://bugzilla.suse.com/947494
https://bugzilla.suse.com/966891
https://bugzilla.suse.com/978993
https://bugzilla.suse.com/982331
https://bugzilla.suse.com/983164
https://bugzilla.suse.com/987176
https://bugzilla.suse.com/988361
https://www.suse.com/security/cve/CVE-2016-5011.html
https://www.suse.com/security/cve/CVE-2017-2616.html
http://www.nessus.org/u?55ba9821

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server for SAP 12:zypper in -t patch
SUSE-SLE-SAP-12-2017-290=1

SUSE Linux Enterprise Server 12-LTSS:zypper in -t patch
SUSE-SLE-SERVER-12-2017-290=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

Medium / CVSS Base Score : 4.7
(CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 3.9
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 97380 ()

Bugtraq ID:

CVE ID: CVE-2016-5011
CVE-2017-2616

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now