SUSE Security Update: Security update for multipath-tools
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3711-1
Rating:             important
References:         #1197570 #1199342 #1199345 #1199346 #1199347 
                    #1201483 #1202616 #1202739 
Cross-References:   CVE-2022-41973 CVE-2022-41974
CVSS scores:
                    CVE-2022-41973 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
                    CVE-2022-41974 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Micro 5.3
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.3
                    SUSE Manager Retail Branch Server 4.3
                    SUSE Manager Server 4.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that solves two vulnerabilities and has 6 fixes
   is now available.

Description:

   This update for multipath-tools fixes the following issues:

   - CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739)
   - CVE-2022-41974: Fixed an authorization bypass issue in multipathd.
     (bsc#1202739)
   - Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
   - libmultipath: fix find_multipaths_timeout for unknown hardware
     (bsc#1201483)
   - multipath-tools: fix "multipath -ll" for Native NVME Multipath devices
     (bsc#1201483)
   - multipathd: don't switch to DAEMON_IDLE during startup (bsc#1199346,
     bsc#1197570)
   - multipathd: avoid delays during uevent processing (bsc#1199347)
   - multipathd: Don't keep starting TUR threads, if they always hang.
     (bsc#1199345)
   - Fix busy loop with delayed_reconfigure (bsc#1199342)
   - multipath.conf: add support for "protocol" subsection in "overrides"
     section to set certain config options by protocol.
   - Removed the previously deprecated options getuid_callout, config_dir,
     multipath_dir, pg_timeout
   - Add disclaimer about vendor support
   - Change built-in defaults for NVMe: group by prio, and immediate failback
   - Fixes for minor issues reported by coverity
   - Fix for memory leak with uid_attrs   - Updates for built in hardware db
   - Logging improvements
   - multipathd: use remove_map_callback for delayed reconfigure
   - Fix handling of path addition in read-only arrays on NVMe
   - Updates of built-in hardware database
   - libmultipath: only warn once about unsupported dev_loss_tmo


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-3711=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3711=1

   - SUSE Linux Enterprise Micro 5.3:

      zypper in -t patch SUSE-SLE-Micro-5.3-2022-3711=1



Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1

   - SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):

      kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1
      kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1
      libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1
      multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1


References:

   https://www.suse.com/security/cve/CVE-2022-41973.html
   https://www.suse.com/security/cve/CVE-2022-41974.html
   https://bugzilla.suse.com/1197570
   https://bugzilla.suse.com/1199342
   https://bugzilla.suse.com/1199345
   https://bugzilla.suse.com/1199346
   https://bugzilla.suse.com/1199347
   https://bugzilla.suse.com/1201483
   https://bugzilla.suse.com/1202616
   https://bugzilla.suse.com/1202739

SUSE: 2022:3711-1 important: multipath-tools

October 24, 2022
An update that solves two vulnerabilities and has 6 fixes is now available

Summary

This update for multipath-tools fixes the following issues: - CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739) - CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739) - Avoid linking to libreadline to avoid licensing issue (bsc#1202616) - libmultipath: fix find_multipaths_timeout for unknown hardware (bsc#1201483) - multipath-tools: fix "multipath -ll" for Native NVME Multipath devices (bsc#1201483) - multipathd: don't switch to DAEMON_IDLE during startup (bsc#1199346, bsc#1197570) - multipathd: avoid delays during uevent processing (bsc#1199347) - multipathd: Don't keep starting TUR threads, if they always hang. (bsc#1199345) - Fix busy loop with delayed_reconfigure (bsc#1199342) - multipath.conf: add support for "protocol" subsection in "overrides" section to set certain config options by protocol. - Removed the previously deprecated options getuid_callout, config_dir, multipath_dir, pg_timeout - Add disclaimer about vendor support - Change built-in defaults for NVMe: group by prio, and immediate failback - Fixes for minor issues reported by coverity - Fix for memory leak with uid_attrs - Updates for built in hardware db - Logging improvements - multipathd: use remove_map_callback for delayed reconfigure - Fix handling of path addition in read-only arrays on NVMe - Updates of built-in hardware database - libmultipath: only warn once about unsupported dev_loss_tmo Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3711=1 - SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3711=1 - SUSE Linux Enterprise Micro 5.3: zypper in -t patch SUSE-SLE-Micro-5.3-2022-3711=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp-devel-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp0_2_0-0.9.0+62+suse.3e048d4-150400.4.7.1 libdmmp0_2_0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-devel-0.9.0+62+suse.3e048d4-150400.4.7.1 - SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64): kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 kpartx-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1 libmpath0-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debuginfo-0.9.0+62+suse.3e048d4-150400.4.7.1 multipath-tools-debugsource-0.9.0+62+suse.3e048d4-150400.4.7.1

References

#1197570 #1199342 #1199345 #1199346 #1199347

#1201483 #1202616 #1202739

Cross- CVE-2022-41973 CVE-2022-41974

CVSS scores:

CVE-2022-41973 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2022-41974 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Linux Enterprise Desktop 15-SP4

SUSE Linux Enterprise High Performance Computing 15-SP4

SUSE Linux Enterprise Micro 5.3

SUSE Linux Enterprise Module for Basesystem 15-SP4

SUSE Linux Enterprise Server 15-SP4

SUSE Linux Enterprise Server for SAP Applications 15-SP4

SUSE Manager Proxy 4.3

SUSE Manager Retail Branch Server 4.3

SUSE Manager Server 4.3

openSUSE Leap 15.4

https://www.suse.com/security/cve/CVE-2022-41973.html

https://www.suse.com/security/cve/CVE-2022-41974.html

https://bugzilla.suse.com/1197570

https://bugzilla.suse.com/1199342

https://bugzilla.suse.com/1199345

https://bugzilla.suse.com/1199346

https://bugzilla.suse.com/1199347

https://bugzilla.suse.com/1201483

https://bugzilla.suse.com/1202616

https://bugzilla.suse.com/1202739

Severity
Announcement ID: SUSE-SU-2022:3711-1
Rating: important

Related News