Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-27456

CVE-2026-27456: util-linux Privilege Escalation Flaw

CVE-2026-27456 is a TOCTOU privilege escalation vulnerability in util-linux mount binary that allows unprivileged users to gain unauthorized access to root-protected files. This article covers technical details, affected versions, and patches.

Published: April 10, 2026

CVE-2026-27456 Overview

A Time-of-Check-Time-of-Use (TOCTOU) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux, affecting versions prior to 2.41.4. This race condition vulnerability allows local unprivileged users to exploit a symlink attack during the mount operation's race window, potentially gaining unauthorized read access to root-protected files and block devices.

The vulnerability exists because the mount binary validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Critical security measures including O_NOFOLLOW, inode comparison, and post-open fstat() are not employed.

Critical Impact

Local attackers can gain unauthorized read access to root-protected files including backup images, disk volumes, and any file containing a valid filesystem by exploiting this TOCTOU race condition in the SUID mount binary.

Affected Products

  • util-linux versions prior to 2.41.4
  • Linux distributions with /usr/bin/mount SUID bit set (default configuration)
  • Systems with /etc/fstab entries containing user,loop options pointing to attacker-writable directories

Discovery Timeline

  • 2026-04-03 - CVE CVE-2026-27456 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-27456

Vulnerability Analysis

This TOCTOU vulnerability represents a classic race condition flaw in privilege-separated file operations. The mount binary performs a two-phase operation where the security-critical file path validation occurs in a different privilege context than the actual file access operation.

When a user invokes the mount command for a loop device, the binary first validates the source file using user privileges by forking a child process, dropping privileges with setuid(), and calling realpath() to canonicalize the path. However, when the parent process subsequently opens and mounts the file, it does so with root privileges without re-validating that the file path still points to the same resource.

The absence of O_NOFOLLOW flag during the privileged open operation means symbolic links are followed. Additionally, the lack of inode comparison or post-open fstat() verification allows an attacker to swap the legitimate source file with a symlink pointing to any root-owned file or device during the race window between validation and use.

Root Cause

The root cause is the missing implementation of the LOOPDEV_FL_NOFOLLOW flag in the loop device handling code. The vulnerable code path calls ul_canonicalize_path(filename) unconditionally, following any symbolic links without restriction. This allows path traversal through symlinks even when the operation is being performed with elevated privileges.

The fix introduces a new flag LOOPDEV_FL_NOFOLLOW that, when set, causes the code to use strdup(filename) instead of ul_canonicalize_path(filename), preventing symlink resolution during privileged operations.

Attack Vector

Exploitation requires specific conditions to be present:

  1. An /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission
  2. The /usr/bin/mount binary must have the SUID bit set (default on virtually all Linux distributions)

The attacker creates a legitimate source file, initiates the mount operation, and during the race window between privilege validation and the actual mount, replaces the source file with a symlink pointing to a target root-owned file or block device. If successful, the root-privileged mount operation will open and mount the attacker-specified target.

c
// Security patch in include/loopdev.h - loopdev: add LOOPDEV_FL_NOFOLLOW to prevent symlink attacks
 	LOOPDEV_FL_NOIOCTL	= (1 << 6),
 	LOOPDEV_FL_DEVSUBDIR	= (1 << 7),
 	LOOPDEV_FL_CONTROL	= (1 << 8),	/* system with /dev/loop-control */
-	LOOPDEV_FL_SIZELIMIT	= (1 << 9)
+	LOOPDEV_FL_SIZELIMIT	= (1 << 9),
+	LOOPDEV_FL_NOFOLLOW	= (1 << 10)	/* O_NOFOLLOW, don't follow symlinks */
 };
 
 /*

Source: GitHub Commit Update

c
// Security patch in lib/loopdev.c - loopdev: add LOOPDEV_FL_NOFOLLOW to prevent symlink attacks
 	if (!lc)
 		return -EINVAL;
 
-	lc->filename = ul_canonicalize_path(filename);
+	if (lc->flags & LOOPDEV_FL_NOFOLLOW)
+		lc->filename = strdup(filename);
+	else
+		lc->filename = ul_canonicalize_path(filename);
 	if (!lc->filename)
 		return -errno;

Source: GitHub Commit Update

Detection Methods for CVE-2026-27456

Indicators of Compromise

  • Unusual symlink creation in directories referenced by /etc/fstab entries with user,loop options
  • Rapid file replacement activity followed by mount operations in user-writable mount point directories
  • Unexpected loop device mounts to sensitive files or block devices
  • Audit log entries showing mount operations with suspicious source paths

Detection Strategies

  • Monitor for symbolic link creation in directories used as mount sources via file integrity monitoring
  • Implement auditd rules to track mount operations and symlink creation in rapid succession
  • Use SentinelOne's behavioral AI to detect anomalous mount binary execution patterns indicative of race condition exploitation
  • Configure alerts for loop device attachments to unexpected file paths or block devices

Monitoring Recommendations

  • Enable kernel audit subsystem logging for mount syscalls and symlink operations
  • Deploy file integrity monitoring on directories configured in /etc/fstab with user mount permissions
  • Monitor process trees for suspicious fork patterns preceding mount operations
  • Implement SentinelOne Singularity platform for real-time detection of privilege escalation attempts via SUID binaries

How to Mitigate CVE-2026-27456

Immediate Actions Required

  • Update util-linux to version 2.41.4 or later on all affected systems
  • Review /etc/fstab entries and remove unnecessary user,loop options from configurations
  • Ensure mount source directories do not reside in user-writable locations
  • Consider temporarily removing SUID bit from /usr/bin/mount if immediate patching is not possible and functionality is not required

Patch Information

The vulnerability has been patched in util-linux version 2.41.4. The fix introduces the LOOPDEV_FL_NOFOLLOW flag which prevents symlink following during privileged loop device operations.

Patch resources:

  • GitHub Security Advisory
  • GitHub Release v2.41.4
  • GitHub Commit Update

Workarounds

  • Remove the SUID bit from mount if not required: chmod u-s /usr/bin/mount
  • Restrict /etc/fstab entries to exclude user or loop options where possible
  • Ensure mount source paths point to directories where only root has write access
  • Implement mandatory access control (SELinux/AppArmor) policies to restrict symlink operations in sensitive directories
bash
# Configuration example
# Temporarily remove SUID bit from mount binary (requires root)
chmod u-s /usr/bin/mount

# Verify the change
ls -la /usr/bin/mount

# To restore SUID after patching (if needed)
chmod u+s /usr/bin/mount

# Review fstab for vulnerable configurations
grep -E 'user.*loop|loop.*user' /etc/fstab

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechUtil Linux

  • SeverityMEDIUM

  • CVSS Score4.7

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-59
  • Technical References
  • GitHub Commit Update

  • GitHub Release v2.41.4

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2022-0563: Util-linux Privilege Escalation Flaw

  • CVE-2026-3184: util-linux Auth Bypass Vulnerability

  • CVE-2021-3995: Kernel Util-linux DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English