{"affected":[{"ecosystem_specific":{"binaries":[{"libblkid1":"2.28-44.35.1","libblkid1-32bit":"2.28-44.35.1","libfdisk1":"2.28-44.35.1","libmount1":"2.28-44.35.1","libmount1-32bit":"2.28-44.35.1","libsmartcols1":"2.28-44.35.1","libuuid1":"2.28-44.35.1","libuuid1-32bit":"2.28-44.35.1","python-libmount":"2.28-44.35.1","util-linux":"2.28-44.35.1","util-linux-lang":"2.28-44.35.1","util-linux-systemd":"2.28-44.35.1","uuidd":"2.28-44.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"python-libmount","purl":"pkg:rpm/suse/python-libmount&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.28-44.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libblkid1":"2.28-44.35.1","libblkid1-32bit":"2.28-44.35.1","libfdisk1":"2.28-44.35.1","libmount1":"2.28-44.35.1","libmount1-32bit":"2.28-44.35.1","libsmartcols1":"2.28-44.35.1","libuuid1":"2.28-44.35.1","libuuid1-32bit":"2.28-44.35.1","python-libmount":"2.28-44.35.1","util-linux":"2.28-44.35.1","util-linux-lang":"2.28-44.35.1","util-linux-systemd":"2.28-44.35.1","uuidd":"2.28-44.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"util-linux","purl":"pkg:rpm/suse/util-linux&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.28-44.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libblkid1":"2.28-44.35.1","libblkid1-32bit":"2.28-44.35.1","libfdisk1":"2.28-44.35.1","libmount1":"2.28-44.35.1","libmount1-32bit":"2.28-44.35.1","libsmartcols1":"2.28-44.35.1","libuuid1":"2.28-44.35.1","libuuid1-32bit":"2.28-44.35.1","python-libmount":"2.28-44.35.1","util-linux":"2.28-44.35.1","util-linux-lang":"2.28-44.35.1","util-linux-systemd":"2.28-44.35.1","uuidd":"2.28-44.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"util-linux-systemd","purl":"pkg:rpm/suse/util-linux-systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.28-44.35.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for util-linux fixes the following issues:\n\n- Improve throughput and reduce clock sequence increments for high load situation with time based \n  version 1 uuids. (bsc#1194642)\n- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)\n- Warn if uuidd lock state is not usable. (bsc#1194642)\n- Fix 'su -s' bash completion. (bsc#1172427)\n- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)\n- Load /etc/default/su (bsc#1116347).\n- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).\n- Do not trim read-only volumes (bsc#1106214).\n- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).\n- agetty: Reload issue only if it is really needed (bsc#1085196)\n- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)\n- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)\n- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)\n- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)\n- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)\n- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)\n- Build with libudev support to support non-root users. (bsc#1169006)\n- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)\n- Fix for warning on mounts to CIFS with mount. (bsc#1174942)\n","id":"SUSE-SU-2022:1103-1","modified":"2022-04-04T15:48:00Z","published":"2022-04-04T15:48:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20221103-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1038841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1081947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1106214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1116347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1122417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1125886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1135534"},{"type":"REPORT","url":"https://bugzilla.suse.com/1135708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1151708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168235"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168389"},{"type":"REPORT","url":"https://bugzilla.suse.com/1169006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-37600"}],"related":["CVE-2021-37600"],"summary":"Security update for util-linux","upstream":["CVE-2021-37600"]}