SUSE update for libeconf, shadow and util-linux



Published: 2022-04-19
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3995
CVE-2021-3996
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

login_defs
Operating systems & Components / Operating system package or component

util-linux-systemd
Operating systems & Components / Operating system package or component

util-linux-debugsource
Operating systems & Components / Operating system package or component

util-linux-debuginfo
Operating systems & Components / Operating system package or component

util-linux
Operating systems & Components / Operating system package or component

shadow-debugsource
Operating systems & Components / Operating system package or component

shadow-debuginfo
Operating systems & Components / Operating system package or component

shadow
Operating systems & Components / Operating system package or component

libuuid1-debuginfo
Operating systems & Components / Operating system package or component

libuuid1
Operating systems & Components / Operating system package or component

libsmartcols1-debuginfo
Operating systems & Components / Operating system package or component

libsmartcols1
Operating systems & Components / Operating system package or component

libmount1-debuginfo
Operating systems & Components / Operating system package or component

libmount1
Operating systems & Components / Operating system package or component

libfdisk1-debuginfo
Operating systems & Components / Operating system package or component

libfdisk1
Operating systems & Components / Operating system package or component

libblkid1-debuginfo
Operating systems & Components / Operating system package or component

libblkid1
Operating systems & Components / Operating system package or component

util-linux-systemd-debugsource
Operating systems & Components / Operating system package or component

util-linux-systemd-debuginfo
Operating systems & Components / Operating system package or component

libeconf0-debuginfo
Operating systems & Components / Operating system package or component

libeconf0
Operating systems & Components / Operating system package or component

libeconf-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU60004

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3995

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to improper parsing of the /proc/self/mountinfo file in libmount. A local user can unmount other user's filesystems that are either world-writable themselves or mounted in a world-writable directory.

Mitigation

Update the affected package libeconf, shadow and util-linux to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.2

login_defs: before 4.8.1-150300.4.3.8

util-linux-systemd: before 2.36.2-150300.4.14.2

util-linux-debugsource: before 2.36.2-150300.4.14.3

util-linux-debuginfo: before 2.36.2-150300.4.14.3

util-linux: before 2.36.2-150300.4.14.3

shadow-debugsource: before 4.8.1-150300.4.3.8

shadow-debuginfo: before 4.8.1-150300.4.3.8

shadow: before 4.8.1-150300.4.3.8

libuuid1-debuginfo: before 2.36.2-150300.4.14.3

libuuid1: before 2.36.2-150300.4.14.3

libsmartcols1-debuginfo: before 2.36.2-150300.4.14.3

libsmartcols1: before 2.36.2-150300.4.14.3

libmount1-debuginfo: before 2.36.2-150300.4.14.3

libmount1: before 2.36.2-150300.4.14.3

libfdisk1-debuginfo: before 2.36.2-150300.4.14.3

libfdisk1: before 2.36.2-150300.4.14.3

libblkid1-debuginfo: before 2.36.2-150300.4.14.3

libblkid1: before 2.36.2-150300.4.14.3

util-linux-systemd-debugsource: before 2.36.2-150300.4.14.2

util-linux-systemd-debuginfo: before 2.36.2-150300.4.14.2

libeconf0-debuginfo: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf0: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf-debugsource: before 0.4.4+git20220104.962774f-150300.3.6.2

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220727-2/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU60005

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3996

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to improper UID check in libmount. A local user can unmount FUSE filesystems of users with similar UID.

Mitigation

Update the affected package libeconf, shadow and util-linux to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.2

login_defs: before 4.8.1-150300.4.3.8

util-linux-systemd: before 2.36.2-150300.4.14.2

util-linux-debugsource: before 2.36.2-150300.4.14.3

util-linux-debuginfo: before 2.36.2-150300.4.14.3

util-linux: before 2.36.2-150300.4.14.3

shadow-debugsource: before 4.8.1-150300.4.3.8

shadow-debuginfo: before 4.8.1-150300.4.3.8

shadow: before 4.8.1-150300.4.3.8

libuuid1-debuginfo: before 2.36.2-150300.4.14.3

libuuid1: before 2.36.2-150300.4.14.3

libsmartcols1-debuginfo: before 2.36.2-150300.4.14.3

libsmartcols1: before 2.36.2-150300.4.14.3

libmount1-debuginfo: before 2.36.2-150300.4.14.3

libmount1: before 2.36.2-150300.4.14.3

libfdisk1-debuginfo: before 2.36.2-150300.4.14.3

libfdisk1: before 2.36.2-150300.4.14.3

libblkid1-debuginfo: before 2.36.2-150300.4.14.3

libblkid1: before 2.36.2-150300.4.14.3

util-linux-systemd-debugsource: before 2.36.2-150300.4.14.2

util-linux-systemd-debuginfo: before 2.36.2-150300.4.14.2

libeconf0-debuginfo: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf0: before 0.4.4+git20220104.962774f-150300.3.6.2

libeconf-debugsource: before 0.4.4+git20220104.962774f-150300.3.6.2

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220727-2/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###