<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for util-linux</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20304-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-08T12:25:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-08T12:25:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-08T12:25:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for util-linux</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for util-linux fixes the following issues:

- Updated to version 2.40.4:
  * agetty: Prevent cursor escape (bsc#1194818)
  * chcpu(8): Document CPU deconfiguring behavior
  * fdisk: SGI fixes
  * hardlink: fix memory corruption
  * hardlink.1 directory|file is mandatory
  * lib/env: fix env_list_setenv() for strings without '='
  * libblkid:
    (exfat) validate fields used by prober
    (gpt) use blkid_probe_verify_csum() for partition array
     checksum
    add FSLASTBLOCK for swaparea
    bitlocker fix version on big-endian systems
  * libfdisk: make sure libblkid uses the same sector size
  * libmount:
    extract common error handling function
    propagate first error of multiple filesystem types
  * logger: correctly format tv_usec
  * lscpu: Skip aarch64 decode path for rest of the architectures
    (bsc#1229476)
  * lsns: ignore ESRCH errors reported when accessing files under
    /proc
  * mkswap: set selinux label also when creating file
  * more: make sure we have data on stderr
  * nsenter: support empty environ
  * umount, losetup: Document loop destroy behavior
    (bsc#1159034).
  * uuidd: fix /var/lib/libuuid mode uuidd-tmpfiles.conf
    fix /var/lib/libuuid mode uuidd-tmpfiles.conf
  - Refresh util-linux.keyring. Key validity was extended.

- Update to version 2.40.2:
  * cfdisk: fix possible integer overflow
  * libmount: improving robustness in reading kernel messages,
    add pidfs to pseudo fs list
  * lscpu: New Arm Cortex part numbers
    fix hang of lscpu -e (bsc#1225598)
  * lsfd: Refactor the pidfd logic, support pidfs
  * mkswap.8.adoc: update note regarding swapfile creation
  * setpgid: make -f work

- Enable kernel mountfd API, as it should be already stable
  (PED-9752).
- Move autoreconf back to %build.
- Add devel dependencies.
- Remove util-linux-rpmlintrc. It is no more needed with multibuild.
- uncomment "autoreconf --install" to use the new version of automake
- disable libmagic in more(1) for binary detection (bsc#1225197)
- add support for pidfs in kernel 6.9 (bsc#1224285)
 
- Update to version 2.40.1:
  * more: clean processes not cleaned up after failed SSH session
    using up 100% CPU (bsc#1220117)
  * CVE-2024-28085: Fixed improper neutralization of escape sequences in wall (bsc#1221831)
  * chcpu: document limitations of -g (bsc#1218609)
  * lscpu: even more Arm part numbers (bsc#1223605)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-95</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520304-1/</URL>
      <Description>Link for SUSE-SU-2025:20304-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021031.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20304-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159034</URL>
      <Description>SUSE Bug 1159034</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194818</URL>
      <Description>SUSE Bug 1194818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218609</URL>
      <Description>SUSE Bug 1218609</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220117</URL>
      <Description>SUSE Bug 1220117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221831</URL>
      <Description>SUSE Bug 1221831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223605</URL>
      <Description>SUSE Bug 1223605</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224285</URL>
      <Description>SUSE Bug 1224285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225197</URL>
      <Description>SUSE Bug 1225197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225598</URL>
      <Description>SUSE Bug 1225598</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229476</URL>
      <Description>SUSE Bug 1229476</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28085/</URL>
      <Description>SUSE CVE CVE-2024-28085 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="lastlog2-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="lastlog2-2.40.4-slfo.1.1_1.1">lastlog2-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libblkid1-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="libblkid1-2.40.4-slfo.1.1_1.1">libblkid1-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfdisk1-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="libfdisk1-2.40.4-slfo.1.1_1.1">libfdisk1-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="liblastlog2-2-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="liblastlog2-2-2.40.4-slfo.1.1_1.1">liblastlog2-2-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmount1-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="libmount1-2.40.4-slfo.1.1_1.1">libmount1-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsmartcols1-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="libsmartcols1-2.40.4-slfo.1.1_1.1">libsmartcols1-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libuuid1-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="libuuid1-2.40.4-slfo.1.1_1.1">libuuid1-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="util-linux-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="util-linux-2.40.4-slfo.1.1_1.1">util-linux-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="util-linux-systemd-2.40.4-slfo.1.1_1.1">
      <FullProductName ProductID="util-linux-systemd-2.40.4-slfo.1.1_1.1">util-linux-systemd-2.40.4-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="lastlog2-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:lastlog2-2.40.4-slfo.1.1_1.1">lastlog2-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libblkid1-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libblkid1-2.40.4-slfo.1.1_1.1">libblkid1-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfdisk1-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libfdisk1-2.40.4-slfo.1.1_1.1">libfdisk1-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="liblastlog2-2-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:liblastlog2-2-2.40.4-slfo.1.1_1.1">liblastlog2-2-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmount1-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libmount1-2.40.4-slfo.1.1_1.1">libmount1-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsmartcols1-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libsmartcols1-2.40.4-slfo.1.1_1.1">libsmartcols1-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libuuid1-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libuuid1-2.40.4-slfo.1.1_1.1">libuuid1-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="util-linux-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:util-linux-2.40.4-slfo.1.1_1.1">util-linux-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="util-linux-systemd-2.40.4-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:util-linux-systemd-2.40.4-slfo.1.1_1.1">util-linux-systemd-2.40.4-slfo.1.1_1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.</Note>
    </Notes>
    <CVE>CVE-2024-28085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:lastlog2-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libblkid1-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libfdisk1-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:liblastlog2-2-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libmount1-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libsmartcols1-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libuuid1-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:util-linux-2.40.4-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:util-linux-systemd-2.40.4-slfo.1.1_1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520304-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28085.html</URL>
        <Description>CVE-2024-28085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221831</URL>
        <Description>SUSE Bug 1221831</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
