Low CentOS util-linux-ng Update

Metadata

low
2.1
libblkid-2.17.2-12.9.el6.i686.rpm, libblkid-2.17.2-12.9.el6.x86_64.rpm, libblkid-devel-2.17.2-12.9.el6.i686.rpm, libblkid-devel-2.17.2-12.9.el6.x86_64.rpm, libuuid-2.17.2-12.9.el6.i686.rpm, libuuid-2.17.2-12.9.el6.x86_64.rpm, libuuid-devel-2.17.2-12.9.el6.i686.rpm, libuuid-devel-2.17.2-12.9.el6.x86_64.rpm, util-linux-ng-2.17.2-12.9.el6.i686.rpm, util-linux-ng-2.17.2-12.9.el6.src.rpm, util-linux-ng-2.17.2-12.9.el6.x86_64.rpm, uuidd-2.17.2-12.9.el6.i686.rpm, uuidd-2.17.2-12.9.el6.x86_64.rpm
CVE-2013-0157
rhn.redhat.com, lists.centos.org, lists.centos.org
2013-03-09
2017-07-27 19:05
CVE-2013-0157 util-linux
CVE-2013-0157
2017-04-01 19:06
2017-01-05 20:10

Description


Updated util-linux-ng packages that fix one security issue, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The util-linux-ng packages contain a large variety of low-level system
utilities that are necessary for a Linux operating system to function.

An information disclosure flaw was found in the way the mount command
reported errors. A local attacker could use this flaw to determine the
existence of files and directories they do not have access to.
(CVE-2013-0157)

These updated util-linux-ng packages include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 6.4 Technical
Notes, linked to in the References, for information on the most significant
of these changes.

All users of util-linux-ng are advised to upgrade to these updated
packages, which contain backported patches to correct these issues and add
these enhancements.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 libblkid libblkid-2.17.2-12.9.el6.i686.rpm
libblkid libblkid-2.17.2-12.9.el6.x86_64.rpm
libblkid-devel libblkid-devel-2.17.2-12.9.el6.i686.rpm
libblkid-devel libblkid-devel-2.17.2-12.9.el6.x86_64.rpm
libuuid libuuid-2.17.2-12.9.el6.i686.rpm
libuuid libuuid-2.17.2-12.9.el6.x86_64.rpm
libuuid-devel libuuid-devel-2.17.2-12.9.el6.i686.rpm
libuuid-devel libuuid-devel-2.17.2-12.9.el6.x86_64.rpm
util-linux-ng util-linux-ng-2.17.2-12.9.el6.i686.rpm
util-linux-ng util-linux-ng-2.17.2-12.9.el6.src.rpm
util-linux-ng util-linux-ng-2.17.2-12.9.el6.x86_64.rpm
uuidd uuidd-2.17.2-12.9.el6.i686.rpm
uuidd uuidd-2.17.2-12.9.el6.x86_64.rpm