Moderate CentOS util-linux Security Update


libblkid-2.23.2-33.el7_3.2.i686.rpm, libblkid-2.23.2-33.el7_3.2.x86_64.rpm, libblkid-devel-2.23.2-33.el7_3.2.i686.rpm, libblkid-devel-2.23.2-33.el7_3.2.x86_64.rpm, libmount-2.23.2-33.el7_3.2.i686.rpm, libmount-2.23.2-33.el7_3.2.x86_64.rpm, libmount-devel-2.23.2-33.el7_3.2.i686.rpm, libmount-devel-2.23.2-33.el7_3.2.x86_64.rpm, libuuid-2.23.2-33.el7_3.2.i686.rpm, libuuid-2.23.2-33.el7_3.2.x86_64.rpm, libuuid-devel-2.23.2-33.el7_3.2.i686.rpm, libuuid-devel-2.23.2-33.el7_3.2.x86_64.rpm, util-linux-2.23.2-33.el7_3.2.i686.rpm, util-linux-2.23.2-33.el7_3.2.src.rpm, util-linux-2.23.2-33.el7_3.2.x86_64.rpm, uuidd-2.23.2-33.el7_3.2.x86_64.rpm,
2018-01-18 11:14
2017-07-27 19:13
2017-07-27 18:03
2017-07-27 00:03
2017-07-26 23:03
2017-07-26 22:03
2017-04-14 09:03


An update for util-linux is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.

Security Fix(es):

* A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616)

Red Hat would like to thank Tobias Stöckmann for reporting this issue.

Bug Fix(es):

* The "findmnt --target " command prints all file systems where the mount point directory is . Previously, when used in the chroot environment, "findmnt --target " incorrectly displayed all mount points. The command has been fixed so that it now checks the mount point path and returns information only for the relevant mount point. (BZ#1414481)
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
7 libblkid libblkid-2.23.2-33.el7_3.2.i686.rpm
libblkid libblkid-2.23.2-33.el7_3.2.x86_64.rpm
libblkid-devel libblkid-devel-2.23.2-33.el7_3.2.i686.rpm
libblkid-devel libblkid-devel-2.23.2-33.el7_3.2.x86_64.rpm
libmount libmount-2.23.2-33.el7_3.2.i686.rpm
libmount libmount-2.23.2-33.el7_3.2.x86_64.rpm
libmount-devel libmount-devel-2.23.2-33.el7_3.2.i686.rpm
libmount-devel libmount-devel-2.23.2-33.el7_3.2.x86_64.rpm
libuuid libuuid-2.23.2-33.el7_3.2.i686.rpm
libuuid libuuid-2.23.2-33.el7_3.2.x86_64.rpm
libuuid-devel libuuid-devel-2.23.2-33.el7_3.2.i686.rpm
libuuid-devel libuuid-devel-2.23.2-33.el7_3.2.x86_64.rpm
util-linux util-linux-2.23.2-33.el7_3.2.i686.rpm
util-linux util-linux-2.23.2-33.el7_3.2.src.rpm
util-linux util-linux-2.23.2-33.el7_3.2.x86_64.rpm
uuidd uuidd-2.23.2-33.el7_3.2.x86_64.rpm