suse-su-2022:3714-1
Vulnerability from csaf_suse
Published
2022-10-24 14:25
Modified
2022-10-24 14:25
Summary
Security update for multipath-tools
Notes
Title of the patch
Security update for multipath-tools
Description of the patch
This update for multipath-tools fixes the following issues:
- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- Avoid device IO in 'multipath -u' (bsc#1125145, bsc#1131789)
- mpathpersist: optimize for setups with many LUNs (bsc#1134648)
- mpathpersist: add option -f/--batch-file (bsc#1134648)
- libmultipath: get_prio(): really don't reset prio for inaccessible paths (bsc#1118495)
- Upstream bug fixes from dm-devel (bsc#1139369):
multipath: call store_pathinfo with DI_BLACKLIST
- hwtable: add Lenovo DE series (bsc#1125507)
Patchnames
SUSE-2022-3714,SUSE-SLE-SERVER-12-SP3-BCL-2022-3714
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for multipath-tools", "title": "Title of the patch" }, { "category": "description", "text": "This update for multipath-tools fixes the following issues:\n\n- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)\n- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)\n- Avoid device IO in \u0027multipath -u\u0027 (bsc#1125145, bsc#1131789)\n- mpathpersist: optimize for setups with many LUNs (bsc#1134648)\n- mpathpersist: add option -f/--batch-file (bsc#1134648)\n- libmultipath: get_prio(): really don\u0027t reset prio for inaccessible paths (bsc#1118495)\n- Upstream bug fixes from dm-devel (bsc#1139369):\n multipath: call store_pathinfo with DI_BLACKLIST\n- hwtable: add Lenovo DE series (bsc#1125507)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-3714,SUSE-SLE-SERVER-12-SP3-BCL-2022-3714", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3714-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:3714-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223714-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:3714-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012646.html" }, { "category": "self", "summary": "SUSE Bug 1118495", "url": "https://bugzilla.suse.com/1118495" }, { "category": "self", "summary": "SUSE Bug 1125145", "url": "https://bugzilla.suse.com/1125145" }, { "category": "self", "summary": "SUSE Bug 1125507", "url": "https://bugzilla.suse.com/1125507" }, { "category": "self", "summary": "SUSE Bug 1131789", "url": "https://bugzilla.suse.com/1131789" }, { "category": "self", "summary": "SUSE Bug 1134648", "url": "https://bugzilla.suse.com/1134648" }, { "category": "self", "summary": "SUSE Bug 1139369", "url": "https://bugzilla.suse.com/1139369" }, { "category": "self", "summary": "SUSE Bug 1202616", "url": "https://bugzilla.suse.com/1202616" }, { "category": "self", "summary": "SUSE Bug 1202739", "url": "https://bugzilla.suse.com/1202739" }, { "category": "self", "summary": "SUSE Bug 1204325", "url": "https://bugzilla.suse.com/1204325" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41974 page", "url": "https://www.suse.com/security/cve/CVE-2022-41974/" } ], "title": "Security update for multipath-tools", "tracking": { "current_release_date": "2022-10-24T14:25:28Z", "generator": { "date": "2022-10-24T14:25:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:3714-1", "initial_release_date": "2022-10-24T14:25:28Z", "revision_history": [ { "date": "2022-10-24T14:25:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.aarch64" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.aarch64" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.aarch64", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.i586", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.i586", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.i586" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.i586", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.i586", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.i586" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.i586", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.i586", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.ppc64le" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.ppc64le" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.ppc64le", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390x", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390x", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.s390x" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390x", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390x", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.s390x" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390x", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390x", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product_id": "kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64" } }, { "category": "product_version", "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product_id": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64" } }, { "category": "product_version", "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product": { "name": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.x86_64", "product_id": "multipath-tools-devel-0.7.1+125+suse.c18e287-2.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64" }, "product_reference": "kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64" }, "product_reference": "multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-41974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41974" } ], "notes": [ { "category": "general", "text": "multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-BCL:kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41974", "url": "https://www.suse.com/security/cve/CVE-2022-41974" }, { "category": "external", "summary": "SUSE Bug 1205472 for CVE-2022-41974", "url": "https://bugzilla.suse.com/1205472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-BCL:kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-BCL:kpartx-0.7.1+125+suse.c18e287-2.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:multipath-tools-0.7.1+125+suse.c18e287-2.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-24T14:25:28Z", "details": "important" } ], "title": "CVE-2022-41974" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…