{"affected":[{"ecosystem_specific":{"binaries":[{"lastlog2":"2.40.4-slfo.1.1_1.1","libblkid1":"2.40.4-slfo.1.1_1.1","libfdisk1":"2.40.4-slfo.1.1_1.1","liblastlog2-2":"2.40.4-slfo.1.1_1.1","libmount1":"2.40.4-slfo.1.1_1.1","libsmartcols1":"2.40.4-slfo.1.1_1.1","libuuid1":"2.40.4-slfo.1.1_1.1","util-linux":"2.40.4-slfo.1.1_1.1","util-linux-systemd":"2.40.4-slfo.1.1_1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"util-linux","purl":"pkg:rpm/suse/util-linux&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.4-slfo.1.1_1.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"lastlog2":"2.40.4-slfo.1.1_1.1","libblkid1":"2.40.4-slfo.1.1_1.1","libfdisk1":"2.40.4-slfo.1.1_1.1","liblastlog2-2":"2.40.4-slfo.1.1_1.1","libmount1":"2.40.4-slfo.1.1_1.1","libsmartcols1":"2.40.4-slfo.1.1_1.1","libuuid1":"2.40.4-slfo.1.1_1.1","util-linux":"2.40.4-slfo.1.1_1.1","util-linux-systemd":"2.40.4-slfo.1.1_1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"util-linux-systemd","purl":"pkg:rpm/suse/util-linux-systemd&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.4-slfo.1.1_1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for util-linux fixes the following issues:\n\n- Updated to version 2.40.4:\n  * agetty: Prevent cursor escape (bsc#1194818)\n  * chcpu(8): Document CPU deconfiguring behavior\n  * fdisk: SGI fixes\n  * hardlink: fix memory corruption\n  * hardlink.1 directory|file is mandatory\n  * lib/env: fix env_list_setenv() for strings without '='\n  * libblkid:\n    (exfat) validate fields used by prober\n    (gpt) use blkid_probe_verify_csum() for partition array\n     checksum\n    add FSLASTBLOCK for swaparea\n    bitlocker fix version on big-endian systems\n  * libfdisk: make sure libblkid uses the same sector size\n  * libmount:\n    extract common error handling function\n    propagate first error of multiple filesystem types\n  * logger: correctly format tv_usec\n  * lscpu: Skip aarch64 decode path for rest of the architectures\n    (bsc#1229476)\n  * lsns: ignore ESRCH errors reported when accessing files under\n    /proc\n  * mkswap: set selinux label also when creating file\n  * more: make sure we have data on stderr\n  * nsenter: support empty environ\n  * umount, losetup: Document loop destroy behavior\n    (bsc#1159034).\n  * uuidd: fix /var/lib/libuuid mode uuidd-tmpfiles.conf\n    fix /var/lib/libuuid mode uuidd-tmpfiles.conf\n  - Refresh util-linux.keyring. Key validity was extended.\n\n- Update to version 2.40.2:\n  * cfdisk: fix possible integer overflow\n  * libmount: improving robustness in reading kernel messages,\n    add pidfs to pseudo fs list\n  * lscpu: New Arm Cortex part numbers\n    fix hang of lscpu -e (bsc#1225598)\n  * lsfd: Refactor the pidfd logic, support pidfs\n  * mkswap.8.adoc: update note regarding swapfile creation\n  * setpgid: make -f work\n\n- Enable kernel mountfd API, as it should be already stable\n  (PED-9752).\n- Move autoreconf back to %build.\n- Add devel dependencies.\n- Remove util-linux-rpmlintrc. It is no more needed with multibuild.\n- uncomment \"autoreconf --install\" to use the new version of automake\n- disable libmagic in more(1) for binary detection (bsc#1225197)\n- add support for pidfs in kernel 6.9 (bsc#1224285)\n \n- Update to version 2.40.1:\n  * more: clean processes not cleaned up after failed SSH session\n    using up 100% CPU (bsc#1220117)\n  * CVE-2024-28085: Fixed improper neutralization of escape sequences in wall (bsc#1221831)\n  * chcpu: document limitations of -g (bsc#1218609)\n  * lscpu: even more Arm part numbers (bsc#1223605)\n","id":"SUSE-SU-2025:20304-1","modified":"2025-05-08T12:24:01Z","published":"2025-05-08T12:24:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520304-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194818"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-28085"}],"related":["CVE-2024-28085"],"summary":"Security update for util-linux","upstream":["CVE-2024-28085"]}