Debian Package Tracker
Register | Log in
Subscribe

util-linux

miscellaneous system utilities

Choose email to subscribe with

general
  • source: util-linux (source, utils)
  • version: 2.30.2-0.1
  • maintainer: LaMont Jones [DMD]
  • uploaders: Adam Conrad [DMD]
  • arch: all any
  • std-ver: 4.1.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.20.1-5.3
  • oldstable: 2.25.2-6
  • stable: 2.29.2-1
  • testing: 2.30.2-0.1
  • unstable: 2.30.2-0.1
versioned links
  • 2.20.1-5.3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.25.2-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.29.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.30.2-0.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • bsdutils
  • fdisk
  • fdisk-udeb
  • libblkid-dev
  • libblkid1
  • libblkid1-udeb
  • libfdisk-dev
  • libfdisk1
  • libfdisk1-udeb
  • libmount-dev
  • libmount1
  • libmount1-udeb
  • libsmartcols-dev
  • libsmartcols1
  • libsmartcols1-udeb
  • libuuid1
  • libuuid1-udeb
  • mount
  • setpriv
  • util-linux
  • util-linux-locales
  • util-linux-udeb
  • uuid-dev
  • uuid-runtime
action needed
A new upstream version is available: 2.31.1
high
A new upstream version 2.31.1 is available, you should consider packaging it.
Created: 2017-11-21 Last update: 2018-01-04 13:50
1 security issue in buster
high
There is 1 open security issue in buster.
1 important issue:
  • CVE-2016-2779: runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Please fix it.
Created: 2017-06-18 Last update: 2017-12-30 19:43
1 security issue in sid
high
There is 1 open security issue in sid.
1 important issue:
  • CVE-2016-2779: runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Please fix it.
Created: 2016-02-27 Last update: 2017-12-30 19:43
lintian reports 13 warnings
high
Lintian reports 13 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2016-04-27 Last update: 2017-12-22 08:05
Fails to build during reproducibility testing
normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2017-12-13 Last update: 2018-01-04 13:58
Depends on packages which need a new maintainer
normal
The packages that util-linux depends on which need a new maintainer are:
  • dh-exec (#851746)
    • Build-Depends: dh-exec
Created: 2017-12-02 Last update: 2018-01-04 13:55
6 bugs tagged help in the BTS
normal
The BTS contains 6 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2017-08-29 Last update: 2018-01-04 13:35
12 bugs tagged patch in the BTS
normal
The BTS contains patches fixing 12 bugs (15 if counting merged bugs), consider including or untagging them.
Created: 2017-11-21 Last update: 2018-01-04 13:35
A new version is available in the VCS, consider uploading it.
normal
vcswatch reports that this package has a new version ready in the VCS. You should consider uploading into the archive.

Created: 2017-12-22 Last update: 2017-12-22 14:01
Multiarch hinter reports 1 issue(s)
low
There are issues with the multiarch metadata for this package.
  • util-linux-locales could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2018-01-04 14:01
1 ignored security issue in stretch
low
There is 1 open security issue in stretch.
1 issue skipped by the security teams:
  • CVE-2016-2779: runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Please fix it.
Created: 2016-02-27 Last update: 2017-12-30 19:43
2 ignored security issues in jessie
low
There are 2 open security issues in jessie.
2 issues skipped by the security teams:
  • CVE-2016-5011: The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
  • CVE-2016-2779: runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Please fix them.
Created: 2016-02-27 Last update: 2017-12-30 19:43
3 ignored security issues in wheezy
low
There are 3 open security issues in wheezy.
3 issues skipped by the security teams:
  • CVE-2016-5011: The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
  • CVE-2014-9114: Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
  • CVE-2013-0157: (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
Please fix them.
Created: 2017-12-30 Last update: 2017-12-30 19:43
Build log checks report 1 warning
low
Build log checks report 1 warning
Created: 2017-10-26 Last update: 2017-10-26 07:23
Standards version of the package is outdated.
wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.1.1 instead of 4.1.0).
Created: 2017-10-10 Last update: 2017-10-10 01:08
news
[rss feed]
  • [2017-10-15] util-linux 2.30.2-0.1 MIGRATED to testing (Debian testing watch)
  • [2017-10-09] Accepted util-linux 2.30.2-0.1 (source) into unstable (Michael Biebl)
  • [2017-09-19] util-linux 2.29.2-5 MIGRATED to testing (Debian testing watch)
  • [2017-09-14] Accepted util-linux 2.29.2-5 (source) into unstable (Andreas Henriksson)
  • [2017-09-04] util-linux 2.29.2-4 MIGRATED to testing (Debian testing watch)
  • [2017-08-17] Accepted util-linux 2.29.2-4 (source) into unstable (Andreas Henriksson)
  • [2017-08-07] Accepted util-linux 2.29.2-3 (source amd64 all) into experimental, experimental (Andreas Henriksson)
  • [2017-07-16] util-linux 2.29.2-2 MIGRATED to testing (Debian testing watch)
  • [2017-07-11] Accepted util-linux 2.29.2-2 (source) into unstable (Andreas Henriksson)
  • [2017-04-04] util-linux 2.29.2-1 MIGRATED to testing (Debian testing watch)
  • [2017-03-22] Accepted util-linux 2.29.2-1 (source) into unstable (Andreas Henriksson)
  • [2017-02-02] util-linux 2.29.1-1 MIGRATED to testing (Debian testing watch)
  • [2017-01-20] Accepted util-linux 2.29.1-1 (source) into unstable (Andreas Henriksson)
  • [2016-11-14] util-linux 2.29-1 MIGRATED to testing (Debian testing watch)
  • [2016-11-09] Accepted util-linux 2.29-1 (source amd64 all) into unstable, unstable (Andreas Henriksson)
  • [2016-10-25] Accepted util-linux 2.29~rc2-1 (source) into experimental (Andreas Henriksson)
  • [2016-09-30] util-linux 2.28.2-1 MIGRATED to testing (Debian testing watch)
  • [2016-09-09] Accepted util-linux 2.28.2-1 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-08-21] util-linux 2.28.1-1 MIGRATED to testing (Debian testing watch)
  • [2016-08-15] Accepted util-linux 2.28.1-1 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-07-20] util-linux 2.28-6 MIGRATED to testing (Debian testing watch)
  • [2016-07-14] Accepted util-linux 2.28-6 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-05-14] util-linux 2.28-5 MIGRATED to testing (Debian testing watch)
  • [2016-05-08] Accepted util-linux 2.28-5 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-05-07] Accepted util-linux 2.28-4 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-05-07] Accepted util-linux 2.28-3 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-05-07] Accepted util-linux 2.28-2 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-04-18] util-linux 2.28-1 MIGRATED to testing (Debian testing watch)
  • [2016-04-12] Accepted util-linux 2.28-1 (source amd64 all) into unstable (Andreas Henriksson)
  • [2016-03-31] Accepted util-linux 2.28~rc2-1 (source amd64 all) into experimental, experimental (Andreas Henriksson)
  • 1
  • 2
bugs [bug history graph]
  • all: 115 127
  • RC: 2
  • I&N: 46 49
  • M&W: 67 76
  • F&P: 0
  • help: 6
  • NC: 1
links
  • lintian (0, 13)
  • buildd: logs, checks, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.30.2-0.1ubuntu1
  • 185 bugs (13 patches)
  • patches for 2.30.2-0.1ubuntu1

Debian Package Tracker — Copyright 2013-2016 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Git Repository — How to contribute