Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4
@ 2026-04-20 14:28 Marcus Hoffmann via buildroot
  2026-04-20 17:23 ` Julien Olivain via buildroot
  2026-05-04 14:48 ` Thomas Perale via buildroot
  0 siblings, 2 replies; 3+ messages in thread
From: Marcus Hoffmann via buildroot @ 2026-04-20 14:28 UTC (permalink / raw)
  To: buildroot; +Cc: Giulio Benetti

Security fixes:

 CVE-2026-27456 - mount(8) TOCTOU symlink attack via loop device.
   The SUID mount follows symlinks when resolving loop backing file
   paths. On systems where non-root users are permitted to mount loop
   devices (via 'user' option in fstab), this allows access to
   arbitrary files.

 CWE-190 - Integer overflow in libblkid parse_dos_extended().
   A crafted MBR disk image can cause uint32_t wraparound in EBR
   chain processing, causing reported partitions to not match the
   on-disk layout. Tools like udisks may then register a partition
   at logical sector 0.

Full release notes: https://www.kernel.org/pub/linux/utils/util-linux/v2.41/v2.41.4-ReleaseNotes

Signed-off-by: Marcus Hoffmann <buildroot@bubu1.eu>
---
 package/util-linux/util-linux.hash | 2 +-
 package/util-linux/util-linux.mk   | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/util-linux/util-linux.hash b/package/util-linux/util-linux.hash
index eab8a0c3b5..5a5656212c 100644
--- a/package/util-linux/util-linux.hash
+++ b/package/util-linux/util-linux.hash
@@ -1,5 +1,5 @@
 # From https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.41/sha256sums.asc
-sha256  3330d873f0fceb5560b89a7dc14e4f3288bbd880e96903ed9b50ec2b5799e58b  util-linux-2.41.3.tar.xz
+sha256  a8c213cc06048862602a42b2d299b340001f6d05c4407b549f3e03521df83688  util-linux-2.41.4.tar.xz
 # License files, locally calculated
 sha256  4c2db318192bda62f3f8fcf71488bb5e602ae4385eba281d711b46cc13a40bb3  README.licensing
 sha256  527f738966ca396cd5a68c1509390de2a780c6b614d9ee57f7544a6161938ed1  Documentation/licenses/COPYING.BSD-2-Clause
diff --git a/package/util-linux/util-linux.mk b/package/util-linux/util-linux.mk
index 7617041a46..1271bc7dc0 100644
--- a/package/util-linux/util-linux.mk
+++ b/package/util-linux/util-linux.mk
@@ -8,7 +8,7 @@
 # util-linux-libs/util-linux-libs.mk needs to be updated accordingly as well.
 
 UTIL_LINUX_VERSION_MAJOR = 2.41
-UTIL_LINUX_VERSION = $(UTIL_LINUX_VERSION_MAJOR).3
+UTIL_LINUX_VERSION = $(UTIL_LINUX_VERSION_MAJOR).4
 UTIL_LINUX_SOURCE = util-linux-$(UTIL_LINUX_VERSION).tar.xz
 UTIL_LINUX_SITE = $(BR2_KERNEL_MIRROR)/linux/utils/util-linux/v$(UTIL_LINUX_VERSION_MAJOR)
 
-- 
2.53.0

_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4
  2026-04-20 14:28 [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4 Marcus Hoffmann via buildroot
@ 2026-04-20 17:23 ` Julien Olivain via buildroot
  2026-05-04 14:48 ` Thomas Perale via buildroot
  1 sibling, 0 replies; 3+ messages in thread
From: Julien Olivain via buildroot @ 2026-04-20 17:23 UTC (permalink / raw)
  To: Marcus Hoffmann; +Cc: buildroot, Giulio Benetti

On 20/04/2026 16:28, Marcus Hoffmann via buildroot wrote:
> Security fixes:
> 
>  CVE-2026-27456 - mount(8) TOCTOU symlink attack via loop device.
>    The SUID mount follows symlinks when resolving loop backing file
>    paths. On systems where non-root users are permitted to mount loop
>    devices (via 'user' option in fstab), this allows access to
>    arbitrary files.
> 
>  CWE-190 - Integer overflow in libblkid parse_dos_extended().
>    A crafted MBR disk image can cause uint32_t wraparound in EBR
>    chain processing, causing reported partitions to not match the
>    on-disk layout. Tools like udisks may then register a partition
>    at logical sector 0.
> 
> Full release notes: 
> https://www.kernel.org/pub/linux/utils/util-linux/v2.41/v2.41.4-ReleaseNotes
> 
> Signed-off-by: Marcus Hoffmann <buildroot@bubu1.eu>

Applied to master, thanks.
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4
  2026-04-20 14:28 [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4 Marcus Hoffmann via buildroot
  2026-04-20 17:23 ` Julien Olivain via buildroot
@ 2026-05-04 14:48 ` Thomas Perale via buildroot
  1 sibling, 0 replies; 3+ messages in thread
From: Thomas Perale via buildroot @ 2026-05-04 14:48 UTC (permalink / raw)
  To: Marcus Hoffmann; +Cc: Thomas Perale, buildroot

In reply of:
> Security fixes:
> 
>  CVE-2026-27456 - mount(8) TOCTOU symlink attack via loop device.
>    The SUID mount follows symlinks when resolving loop backing file
>    paths. On systems where non-root users are permitted to mount loop
>    devices (via 'user' option in fstab), this allows access to
>    arbitrary files.
> 
>  CWE-190 - Integer overflow in libblkid parse_dos_extended().
>    A crafted MBR disk image can cause uint32_t wraparound in EBR
>    chain processing, causing reported partitions to not match the
>    on-disk layout. Tools like udisks may then register a partition
>    at logical sector 0.
> 
> Full release notes: https://www.kernel.org/pub/linux/utils/util-linux/v2.41/v2.41.4-ReleaseNotes
> 
> Signed-off-by: Marcus Hoffmann <buildroot@bubu1.eu>

Applied to 2026.02.x. Thanks

> ---
>  package/util-linux/util-linux.hash | 2 +-
>  package/util-linux/util-linux.mk   | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/package/util-linux/util-linux.hash b/package/util-linux/util-linux.hash
> index eab8a0c3b5..5a5656212c 100644
> --- a/package/util-linux/util-linux.hash
> +++ b/package/util-linux/util-linux.hash
> @@ -1,5 +1,5 @@
>  # From https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.41/sha256sums.asc
> -sha256  3330d873f0fceb5560b89a7dc14e4f3288bbd880e96903ed9b50ec2b5799e58b  util-linux-2.41.3.tar.xz
> +sha256  a8c213cc06048862602a42b2d299b340001f6d05c4407b549f3e03521df83688  util-linux-2.41.4.tar.xz
>  # License files, locally calculated
>  sha256  4c2db318192bda62f3f8fcf71488bb5e602ae4385eba281d711b46cc13a40bb3  README.licensing
>  sha256  527f738966ca396cd5a68c1509390de2a780c6b614d9ee57f7544a6161938ed1  Documentation/licenses/COPYING.BSD-2-Clause
> diff --git a/package/util-linux/util-linux.mk b/package/util-linux/util-linux.mk
> index 7617041a46..1271bc7dc0 100644
> --- a/package/util-linux/util-linux.mk
> +++ b/package/util-linux/util-linux.mk
> @@ -8,7 +8,7 @@
>  # util-linux-libs/util-linux-libs.mk needs to be updated accordingly as well.
>  
>  UTIL_LINUX_VERSION_MAJOR = 2.41
> -UTIL_LINUX_VERSION = $(UTIL_LINUX_VERSION_MAJOR).3
> +UTIL_LINUX_VERSION = $(UTIL_LINUX_VERSION_MAJOR).4
>  UTIL_LINUX_SOURCE = util-linux-$(UTIL_LINUX_VERSION).tar.xz
>  UTIL_LINUX_SITE = $(BR2_KERNEL_MIRROR)/linux/utils/util-linux/v$(UTIL_LINUX_VERSION_MAJOR)
>  
> -- 
> 2.53.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot@buildroot.org
> https://lists.buildroot.org/mailman/listinfo/buildroot
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2026-05-04 14:48 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-20 14:28 [Buildroot] [PATCH] package/util-linux: security bump to 2.41.4 Marcus Hoffmann via buildroot
2026-04-20 17:23 ` Julien Olivain via buildroot
2026-05-04 14:48 ` Thomas Perale via buildroot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox