[SUSE-SU-2021:3474-1] Security update for util-linux
Severity
Moderate
Affected Packages
21
CVEs
1
Security update for util-linux
This update for util-linux fixes the following issues:
- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c. (bsc#1188921)
- ID
- SUSE-SU-2021:3474-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2021/suse-su-20213474-1/
- Published
-
2021-10-20T06:41:43
(2 years ago) - Modified
-
2021-10-20T06:41:43
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3474-1.json | |
Suse | URL for SUSE-SU-2021:3474-1 | https://www.suse.com/support/update/announcement/2021/suse-su-20213474-1/ | |
Suse | E-Mail link for SUSE-SU-2021:3474-1 | https://lists.suse.com/pipermail/sle-security-updates/2021-October/009619.html | |
Bugzilla | SUSE Bug 1178236 | https://bugzilla.suse.com/1178236 | |
Bugzilla | SUSE Bug 1188921 | https://bugzilla.suse.com/1188921 | |
CVE | SUSE CVE CVE-2021-37600 page | https://www.suse.com/security/cve/CVE-2021-37600/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/util-linux?arch=x86_64&distro=slem-5 | suse | util-linux | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/util-linux?arch=s390x&distro=slem-5 | suse | util-linux | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/util-linux?arch=aarch64&distro=slem-5 | suse | util-linux | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/util-linux-systemd?arch=x86_64&distro=slem-5 | suse | util-linux-systemd | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/util-linux-systemd?arch=s390x&distro=slem-5 | suse | util-linux-systemd | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/util-linux-systemd?arch=aarch64&distro=slem-5 | suse | util-linux-systemd | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/libuuid1?arch=x86_64&distro=slem-5 | suse | libuuid1 | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libuuid1?arch=s390x&distro=slem-5 | suse | libuuid1 | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/libuuid1?arch=aarch64&distro=slem-5 | suse | libuuid1 | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/libsmartcols1?arch=x86_64&distro=slem-5 | suse | libsmartcols1 | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libsmartcols1?arch=s390x&distro=slem-5 | suse | libsmartcols1 | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/libsmartcols1?arch=aarch64&distro=slem-5 | suse | libsmartcols1 | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/libmount1?arch=x86_64&distro=slem-5 | suse | libmount1 | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libmount1?arch=s390x&distro=slem-5 | suse | libmount1 | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/libmount1?arch=aarch64&distro=slem-5 | suse | libmount1 | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/libfdisk1?arch=x86_64&distro=slem-5 | suse | libfdisk1 | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libfdisk1?arch=s390x&distro=slem-5 | suse | libfdisk1 | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/libfdisk1?arch=aarch64&distro=slem-5 | suse | libfdisk1 | < 2.36.2-4.5.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/libblkid1?arch=x86_64&distro=slem-5 | suse | libblkid1 | < 2.36.2-4.5.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/libblkid1?arch=s390x&distro=slem-5 | suse | libblkid1 | < 2.36.2-4.5.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/libblkid1?arch=aarch64&distro=slem-5 | suse | libblkid1 | < 2.36.2-4.5.1 | slem-5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |