SUSE update for libeconf, shadow and util-linux



Published: 2022-03-04
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3995
CVE-2021-3996
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Transactional Server
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Basesystem
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Server Applications
Operating systems & Components / Operating system

util-linux-lang
Operating systems & Components / Operating system package or component

login_defs
Operating systems & Components / Operating system package or component

libuuid1-32bit-debuginfo
Operating systems & Components / Operating system package or component

libuuid1-32bit
Operating systems & Components / Operating system package or component

libmount1-32bit-debuginfo
Operating systems & Components / Operating system package or component

libmount1-32bit
Operating systems & Components / Operating system package or component

libblkid1-32bit-debuginfo
Operating systems & Components / Operating system package or component

libblkid1-32bit
Operating systems & Components / Operating system package or component

util-linux-systemd
Operating systems & Components / Operating system package or component

util-linux-debugsource
Operating systems & Components / Operating system package or component

util-linux-debuginfo
Operating systems & Components / Operating system package or component

util-linux
Operating systems & Components / Operating system package or component

shadow-debugsource
Operating systems & Components / Operating system package or component

shadow-debuginfo
Operating systems & Components / Operating system package or component

shadow
Operating systems & Components / Operating system package or component

libuuid1-debuginfo
Operating systems & Components / Operating system package or component

libuuid1
Operating systems & Components / Operating system package or component

libuuid-devel-static
Operating systems & Components / Operating system package or component

libuuid-devel
Operating systems & Components / Operating system package or component

libsmartcols1-debuginfo
Operating systems & Components / Operating system package or component

libsmartcols1
Operating systems & Components / Operating system package or component

libsmartcols-devel
Operating systems & Components / Operating system package or component

libmount1-debuginfo
Operating systems & Components / Operating system package or component

libmount1
Operating systems & Components / Operating system package or component

libmount-devel
Operating systems & Components / Operating system package or component

libfdisk1-debuginfo
Operating systems & Components / Operating system package or component

libfdisk1
Operating systems & Components / Operating system package or component

libfdisk-devel
Operating systems & Components / Operating system package or component

libblkid1-debuginfo
Operating systems & Components / Operating system package or component

libblkid1
Operating systems & Components / Operating system package or component

libblkid-devel-static
Operating systems & Components / Operating system package or component

libblkid-devel
Operating systems & Components / Operating system package or component

uuidd-debuginfo
Operating systems & Components / Operating system package or component

uuidd
Operating systems & Components / Operating system package or component

util-linux-systemd-debugsource
Operating systems & Components / Operating system package or component

util-linux-systemd-debuginfo
Operating systems & Components / Operating system package or component

libeconf0-debuginfo
Operating systems & Components / Operating system package or component

libeconf0
Operating systems & Components / Operating system package or component

libeconf-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU60004

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3995

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to improper parsing of the /proc/self/mountinfo file in libmount. A local user can unmount other user's filesystems that are either world-writable themselves or mounted in a world-writable directory.

Mitigation

Update the affected package libeconf, shadow and util-linux to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP3-LTSS

SUSE Linux Enterprise Module for Transactional Server: 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Micro: 5.1

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Basesystem: 15-SP3

SUSE Linux Enterprise Module for Server Applications: 15-SP3

util-linux-lang: before 2.36.2-150300.4.14.3

login_defs: before 4.8.1-150300.4.3.8

libuuid1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libuuid1-32bit: before 2.36.2-150300.4.14.3

libmount1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libmount1-32bit: before 2.36.2-150300.4.14.3

libblkid1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libblkid1-32bit: before 2.36.2-150300.4.14.3

util-linux-systemd: before 2.36.2-150300.4.14.2

util-linux-debugsource: before 2.36.2-150300.4.14.3

util-linux-debuginfo: before 2.36.2-150300.4.14.3

util-linux: before 2.36.2-150300.4.14.3

shadow-debugsource: before 4.8.1-150300.4.3.8

shadow-debuginfo: before 4.8.1-150300.4.3.8

shadow: before 4.8.1-150300.4.3.8

libuuid1-debuginfo: before 2.36.2-150300.4.14.3

libuuid1: before 2.36.2-150300.4.14.3

libuuid-devel-static: before 2.36.2-150300.4.14.3

libuuid-devel: before 2.36.2-150300.4.14.3

libsmartcols1-debuginfo: before 2.36.2-150300.4.14.3

libsmartcols1: before 2.36.2-150300.4.14.3

libsmartcols-devel: before 2.36.2-150300.4.14.3

libmount1-debuginfo: before 2.36.2-150300.4.14.3

libmount1: before 2.36.2-150300.4.14.3

libmount-devel: before 2.36.2-150300.4.14.3

libfdisk1-debuginfo: before 2.36.2-150300.4.14.3

libfdisk1: before 2.36.2-150300.4.14.3

libfdisk-devel: before 2.36.2-150300.4.14.3

libblkid1-debuginfo: before 2.36.2-150300.4.14.3

libblkid1: before 2.36.2-150300.4.14.3

libblkid-devel-static: before 2.36.2-150300.4.14.3

libblkid-devel: before 2.36.2-150300.4.14.3

uuidd-debuginfo: before 2.36.2-150300.4.14.2

uuidd: before 2.36.2-150300.4.14.2

util-linux-systemd-debugsource: before 2.36.2-150300.4.14.2

util-linux-systemd-debuginfo: before 2.36.2-150300.4.14.2

libeconf0-debuginfo: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf0: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf-debugsource: before 0.4.4+git20220104.962774f-150300.3.6.2

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220727-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU60005

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3996

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to improper UID check in libmount. A local user can unmount FUSE filesystems of users with similar UID.

Mitigation

Update the affected package libeconf, shadow and util-linux to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP3-LTSS

SUSE Linux Enterprise Module for Transactional Server: 15-SP3

SUSE Linux Enterprise Desktop: 15-SP3

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Micro: 5.1

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Basesystem: 15-SP3

SUSE Linux Enterprise Module for Server Applications: 15-SP3

util-linux-lang: before 2.36.2-150300.4.14.3

login_defs: before 4.8.1-150300.4.3.8

libuuid1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libuuid1-32bit: before 2.36.2-150300.4.14.3

libmount1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libmount1-32bit: before 2.36.2-150300.4.14.3

libblkid1-32bit-debuginfo: before 2.36.2-150300.4.14.3

libblkid1-32bit: before 2.36.2-150300.4.14.3

util-linux-systemd: before 2.36.2-150300.4.14.2

util-linux-debugsource: before 2.36.2-150300.4.14.3

util-linux-debuginfo: before 2.36.2-150300.4.14.3

util-linux: before 2.36.2-150300.4.14.3

shadow-debugsource: before 4.8.1-150300.4.3.8

shadow-debuginfo: before 4.8.1-150300.4.3.8

shadow: before 4.8.1-150300.4.3.8

libuuid1-debuginfo: before 2.36.2-150300.4.14.3

libuuid1: before 2.36.2-150300.4.14.3

libuuid-devel-static: before 2.36.2-150300.4.14.3

libuuid-devel: before 2.36.2-150300.4.14.3

libsmartcols1-debuginfo: before 2.36.2-150300.4.14.3

libsmartcols1: before 2.36.2-150300.4.14.3

libsmartcols-devel: before 2.36.2-150300.4.14.3

libmount1-debuginfo: before 2.36.2-150300.4.14.3

libmount1: before 2.36.2-150300.4.14.3

libmount-devel: before 2.36.2-150300.4.14.3

libfdisk1-debuginfo: before 2.36.2-150300.4.14.3

libfdisk1: before 2.36.2-150300.4.14.3

libfdisk-devel: before 2.36.2-150300.4.14.3

libblkid1-debuginfo: before 2.36.2-150300.4.14.3

libblkid1: before 2.36.2-150300.4.14.3

libblkid-devel-static: before 2.36.2-150300.4.14.3

libblkid-devel: before 2.36.2-150300.4.14.3

uuidd-debuginfo: before 2.36.2-150300.4.14.2

uuidd: before 2.36.2-150300.4.14.2

util-linux-systemd-debugsource: before 2.36.2-150300.4.14.2

util-linux-systemd-debuginfo: before 2.36.2-150300.4.14.2

libeconf0-debuginfo: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf0: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf-debugsource: before 0.4.4+git20220104.962774f-150300.3.6.2

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220727-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###