Описание
Security update for util-linux
This update for util-linux fixes the following issues:
-
Consider redundant slashes when comparing paths (bsc#982331, util-linux-libmount-ignore-redundant-slashes.patch, affects backport of util-linux-libmount-cifs-is_mounted.patch).
-
Use upstream compatibility patches for --show-pt-geometry with obsolescence and deprecation warning (bsc#990531)
-
Replace cifs mount detection patch with upstream one that covers all cases (bsc#987176).
-
Reuse existing loop device to prevent possible data corruption when multiple -o loop are used to mount a single file (bsc#947494)
-
Safe loop re-use in libmount, mount and losetup (bsc#947494)
-
UPSTREAM DIVERGENCE!!! losetup -L continues to use SLE12 SP1 and SP2 specific meaning --logical-blocksize instead of upstream --nooverlap (bsc#966891).
-
Make release-dependent conflict with old sysvinit-tools SLE specific, as it is required only for SLE 11 upgrade, and breaks openSUSE staging builds (bsc#994399).
-
Extended partition loop in MBR partition table leads to DoS (bsc#988361, CVE-2016-5011)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Список пакетов
openSUSE Leap 42.2
Ссылки
- E-Mail link for openSUSE-SU-2016:3102-1
- SUSE Security Ratings
Описание
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
Затронутые продукты
Ссылки
- CVE-2016-5011
- SUSE Bug 988361