Debian Package Tracker
Register | Log in
Subscribe

util-linux

miscellaneous system utilities

Choose email to subscribe with

general
  • source: util-linux (main)
  • version: 2.42-1
  • maintainer: Chris Hofstaedtler (DMD)
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.36.1-8+deb11u2
  • o-o-sec: 2.36.1-8+deb11u2
  • oldstable: 2.38.1-5+deb12u3
  • old-sec: 2.38.1-5+deb12u1
  • stable: 2.41-5
  • testing: 2.41.3-4
  • unstable: 2.42-1
versioned links
  • 2.36.1-8+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.38.1-5+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.38.1-5+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.41-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.41.3-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.42-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • bsdextrautils (7 bugs: 0, 5, 2, 0)
  • bsdutils (4 bugs: 0, 4, 0, 0)
  • eject
  • eject-udeb
  • fdisk (5 bugs: 0, 4, 1, 0)
  • fdisk-udeb
  • lastlog2
  • libblkid-dev (1 bugs: 0, 0, 1, 0)
  • libblkid1 (2 bugs: 0, 2, 0, 0)
  • libblkid1-udeb
  • libfdisk-dev (1 bugs: 0, 0, 1, 0)
  • libfdisk1 (1 bugs: 0, 1, 0, 0)
  • libfdisk1-udeb
  • liblastlog2-2
  • liblastlog2-dev
  • libmount-dev
  • libmount1
  • libmount1-udeb (1 bugs: 1, 0, 0, 0)
  • libpam-lastlog2
  • libsmartcols-dev
  • libsmartcols1
  • libsmartcols1-udeb
  • libuuid1
  • libuuid1-udeb
  • login (5 bugs: 0, 4, 1, 0)
  • mount (10 bugs: 0, 5, 5, 0)
  • rfkill
  • util-linux (42 bugs: 0, 25, 17, 0)
  • util-linux-extra (1 bugs: 0, 1, 0, 0)
  • util-linux-locales (1 bugs: 0, 1, 0, 0)
  • util-linux-udeb
  • uuid-dev
  • uuid-runtime
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

1 important issue:
  • CVE-2026-27456: util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.
1 issue left for the package maintainer to handle:
  • CVE-2026-3184: (needs triaging) A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-12-06 Last update: 2026-04-04 04:31
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-3184: A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
Created: 2026-02-26 Last update: 2026-04-04 04:31
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-3184: A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
  • CVE-2026-27456: util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.
Created: 2026-02-26 Last update: 2026-04-04 04:31
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2026-27456: util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.
1 ignored issue:
  • CVE-2026-3184: A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
Created: 2026-04-02 Last update: 2026-04-04 04:31
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2026-27456: util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.
1 ignored issue:
  • CVE-2026-3184: A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
Created: 2025-12-06 Last update: 2026-04-04 04:31
9 bugs tagged help in the BTS normal
The BTS contains 9 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2019-03-21 Last update: 2026-04-05 03:00
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-03 Last update: 2026-04-03 03:01
debian/patches: 9 patches to forward upstream low

Among the 9 debian patches available in version 2.42-1 of the package, we noticed the following issues:

  • 9 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-03 11:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-04-03 01:30
testing migrations
  • excuses:
    • Migration status for util-linux (2.41.3-4 to 2.42-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating util-linux would introduce bugs in testing: #1132561
    • ∙ ∙ Autopkgtest for cyrus-imapd/3.12.1-3: s390x: Pass ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for cyrus-imapd/3.12.2-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Pass, riscv64: Pass
    • ∙ ∙ Autopkgtest for debusine/0.14.5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for dracut/110-8: amd64: Pass, arm64: Pass, i386: No tests, superficial or marked flaky ♻, ppc64el: Regression ♻ (reference ♻), riscv64: Test triggered (failure will be ignored), s390x: Failed (not a regression) ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for glome/0.3.0-4: amd64: Pass, arm64: Pass, i386: Regression ♻ (reference ♻), ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-21/21.0.11~6ea-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-25/25.0.3~5ea-2: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-26/26+35-1: amd64: Ignored failure ♻ (reference ♻), arm64: Test triggered (failure will be ignored), i386: Ignored failure ♻ (reference ♻), ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for python3.13/3.13.12-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for python3.14/3.14.3-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for r-cran-raster/3.6-31-2: amd64: Pass, arm64: Pass, i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Pass, riscv64: Pass, s390x: Reference test triggered, but real test failed already ♻
    • ∙ ∙ Autopkgtest for streamlink/8.2.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for util-linux/2.42-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Too young, only 2 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Updating util-linux will fix bugs in testing: #1126894
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/u/util-linux.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproducibility regression on arm64: bsdextrautils, bsdutils, eject, eject-udeb, fdisk, fdisk-udeb, lastlog2, libblkid-dev, libblkid1, libblkid1-udeb, libfdisk-dev, libfdisk1, libfdisk1-udeb, liblastlog2-2, liblastlog2-dev, libmount-dev, libmount1, libmount1-udeb, libpam-lastlog2, libsmartcols-dev, libsmartcols1, libsmartcols1-udeb, libuuid1, libuuid1-udeb, login, mount, rfkill, util-linux, util-linux-extra, util-linux-udeb, uuid-dev, uuid-runtime
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • Not considered
news
[rss feed]
  • [2026-04-02] Accepted util-linux 2.42-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-03-26] Accepted util-linux 2.42~rc2-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-03-23] Accepted util-linux 2.42~rc1-3 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-03-03] Accepted util-linux 2.42~rc1-2 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-02-28] Accepted util-linux 2.42~rc1-1 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-02-24] util-linux 2.41.3-4 MIGRATED to testing (Debian testing watch)
  • [2026-02-21] Accepted util-linux 2.41.3-4 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2026-01-25] util-linux 2.41.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-12-31] Accepted util-linux 2.41.3-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-12-30] util-linux 2.41.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-12-18] Accepted util-linux 2.41.3-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-12-16] Accepted util-linux 2.41.3-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-10-30] util-linux 2.41.2-4 MIGRATED to testing (Debian testing watch)
  • [2025-10-10] Accepted util-linux 2.41.2-4 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-29] Accepted util-linux 2.41.2-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-28] Accepted util-linux 2.41.2-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-28] util-linux 2.41.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-24] Accepted util-linux 2.41.2-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-16] util-linux 2.41.1-3 MIGRATED to testing (Debian testing watch)
  • [2025-09-14] Accepted util-linux 2.41.1-4 (source) into experimental (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-09] Accepted util-linux 2.41.1-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-09-08] util-linux 2.41.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-08-30] Accepted util-linux 2.41.1-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-08-17] util-linux 2.41.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-12] Accepted util-linux 2.41.1-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-05-22] util-linux 2.41-5 MIGRATED to testing (Debian testing watch)
  • [2025-05-09] Accepted util-linux 2.41-5 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-04-13] util-linux 2.41-4 MIGRATED to testing (Debian testing watch)
  • [2025-04-09] Accepted util-linux 2.41-4 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-04-08] util-linux 2.41-3 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 82 88
  • RC: 0
  • I&N: 51 57
  • M&W: 31
  • F&P: 0
  • patch: 0
  • help: 9
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (100, 59)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.41.3-3ubuntu2
  • 224 bugs (11 patches)
  • patches for 2.41.3-3ubuntu2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing