SUSE-SU-2021:14693-1: important: Security update for util-linux
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Apr 14 22:16:57 UTC 2021
SUSE Security Update: Security update for util-linux
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:14693-1
Rating: important
References: #1040414 #903440 #903738 #923777 #923904
#924994 #925705 #930236 #931607 #949754
Cross-References: CVE-2015-5218
Affected Products:
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves one vulnerability and has 9 fixes is
now available.
Description:
This update for util-linux fixes the following issues:
- CVE-2015-5218: Prevent colcrt buffer overflow. (bsc#949754)
These non-security issues were fixed:
- Mount crashes when trying to mount `shmfs` while `SELinux` is active.
(bsc#1040414)
- Fix `lsblk -f` on `CCISS` and other devices with nodes in `/dev`
subdirectory. (bsc#924994)
- Fix `script(1)` hang caused by mis-interpreted EOF on big-endian
platforms. (bsc#930236)
- Do not segfault when TERM is not defined or wrong. (bsc#903440)
- Update and fix mount XFS documentation. (bsc#925705)
- Fix recognition of `/dev/dm-N` partitions names. (bsc#931607)
- Follow SUSE Linux Enterprise 11 device mapper partition names
configuration. (bsc#931607)
- Fix recognition of device mapper partitions. (bsc#923904)
- Fix `fsck -C {fd}` parsing. (bsc#923777, bsc#903738)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-util-linux-14693=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-util-linux-14693=1
Package List:
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
libblkid1-2.19.1-6.62.7.1
libuuid1-2.19.1-6.62.7.1
util-linux-2.19.1-6.62.7.1
util-linux-lang-2.19.1-6.62.7.1
uuid-runtime-2.19.1-6.62.7.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
util-linux-debuginfo-2.19.1-6.62.7.1
util-linux-debugsource-2.19.1-6.62.7.1
References:
https://www.suse.com/security/cve/CVE-2015-5218.html
https://bugzilla.suse.com/1040414
https://bugzilla.suse.com/903440
https://bugzilla.suse.com/903738
https://bugzilla.suse.com/923777
https://bugzilla.suse.com/923904
https://bugzilla.suse.com/924994
https://bugzilla.suse.com/925705
https://bugzilla.suse.com/930236
https://bugzilla.suse.com/931607
https://bugzilla.suse.com/949754
More information about the sle-security-updates
mailing list