Security update for util-linux

This update for util-linux fixes the following issues:

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041).

This non-security issues were fixed:

- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts (bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option "users,exec,dev,suid" work as expected on NFS mounts (bsc#1008965)
- Fix empty slave detection to prevent 100% CPU load in some cases (bsc#1020985)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1008965
On an NFS mount, "users,exec,dev,suid" does not work as expected
bnc#1012632
util-linux libmount check for r/w fs causes scaling problems
bnc#1019332
lscpu aborts unexpectedly
bnc#1020985
script command goes to 99% utilization and appears to hang
bnc#1023041
VUL-0: CVE-2017-2616: util-linux, coreutils: su PAM local SIGKILL DoS
bnc#1012504
Under "Repository Management", when adding a local ISO image, making any change prior to exiting YaST produces an error
bnc#1020077
fstrim.service should not run fstrim -a
Selected Binaries
openSUSE Build Service is sponsored by