[{"id":3679392,"web_url":"http://patchwork.ozlabs.org/comment/3679392/","msgid":"<ae0eacb0-2de8-4160-a6ce-2f648980e644@bubu1.eu>","list_archive_url":null,"date":"2026-04-20T12:37:42","subject":"Re: [Buildroot] [PATCH] package/systemd: security bump to v258.7","submitter":{"id":87807,"url":"http://patchwork.ozlabs.org/api/people/87807/","name":"Marcus Hoffmann","email":"buildroot@bubu1.eu"},"content":"Hi Titouan,\n\nOn 4/20/26 11:58, Titouan Christophe via buildroot wrote:\n> This fixes the following vulnerabilities:\n\nI've added a note to both CVE which patch release they got fixed by.\n\n> \n> - CVE-2026-29111:\n>      systemd, a system and service manager, (as PID 1) hits an assert and\n>      freezes execution when an unprivileged IPC API call is made with\n>      spurious data. On version v249 and older the effect is not an assert,\n>      but stack overwriting, with the attacker controlled content. From\n>      version v250 and newer this is not possible as the safety check causes\n>      an assert instead. This IPC call was added in v239, so versions older\n>      than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11\n>      contain patches. No known workarounds are available.\n>      https://www.cve.org/CVERecord?id=CVE-2026-29111\n> \n> - CVE-2026-40226:\n>      In nspawn in systemd 233 through 259 before 260, an escape-to-host\n>      action can occur via a crafted optional config file.\n>      https://www.cve.org/CVERecord?id=CVE-2026-40226\n>      https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx\n> \n> Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>\n> ---\nApplied to master with these changes, thanks!\n\nMarcus","headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=EfyzIf7m;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=140.211.166.136; helo=smtp3.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzlPr3wJ7z1yGs\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Mon, 20 Apr 2026 22:37:52 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id B9BE5610EA;\n\tMon, 20 Apr 2026 12:37:49 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id Nk2820jZHuo2; Mon, 20 Apr 2026 12:37:48 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id B79FA610EB;\n\tMon, 20 Apr 2026 12:37:48 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 90BED259\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 12:37:46 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 75103610EB\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 12:37:46 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id DtpaHupGi4dh for <buildroot@buildroot.org>;\n Mon, 20 Apr 2026 12:37:45 +0000 (UTC)","from smtp.bubu1.eu (smtp.bubu1.eu [176.9.145.28])\n by smtp3.osuosl.org (Postfix) with ESMTPS id 8B797610EA\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 12:37:45 +0000 (UTC)","from [192.168.178.20] (unknown [212.37.174.96])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)\n key-exchange X25519MLKEM768 server-signature RSA-PSS (4096 bits)\n server-digest\n SHA256) (No client certificate requested)\n by smtp.bubu1.eu (Postfix) with ESMTPSA id 277532C838ED;\n Mon, 20 Apr 2026 14:37:43 +0200 (CEST)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp3.osuosl.org B79FA610EB","OpenDKIM Filter v2.11.0 smtp3.osuosl.org 8B797610EA"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776688668;\n\tbh=zxuf0fsF+T8xelh9MjFNZ67FbWWfTOFZFzKKIs0+X+w=;\n\th=Date:To:Cc:References:In-Reply-To:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From:Reply-To:From;\n\tb=EfyzIf7m+3oSe25Z3sfdFdj5XCR+hj0eiA4PQzJWSKWn9j8eBjb/MLYGLRTF2VxkW\n\t jOtX5Ocja/PJTVxayRkpxUQNhHv1BqRTMctjyfZFuK39+WJy3LmR2p+ONDS/lCnPjt\n\t jG/t5dv51j1vzQAtw+YOewlogDHCFH6auhb1BfOKKNxoL/RB8HJ5crTt3LELAfEFZ6\n\t k6RQO92zdUMw1i2RfitwaxOS0iVPaL8O9LA3XQGDYyGbB8+BVl/Xp9GX8Hv6ZiSRtl\n\t kKc3Gq0GinaLfW4BC1CQramkVjn9rnM/tUiW7KJhJL5O3PtbXd0QpruofyvihSSwuJ\n\t 1ykDeIOq/kZWw==","Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=176.9.145.28;\n helo=smtp.bubu1.eu; envelope-from=buildroot@bubu1.eu; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org 8B797610EA","Message-ID":"<ae0eacb0-2de8-4160-a6ce-2f648980e644@bubu1.eu>","Date":"Mon, 20 Apr 2026 14:37:42 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Titouan Christophe <titouan.christophe@mind.be>, buildroot@buildroot.org","Cc":"Norbert Lange <nolange79@gmail.com>, Sen Hastings <sen@hastings.org>","References":"<20260420095823.2561132-1-titouan.christophe@mind.be>","Content-Language":"en-US","In-Reply-To":"<20260420095823.2561132-1-titouan.christophe@mind.be>","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple;\n d=bubu1.eu; s=bubu;\n t=1776688663; bh=2uWenO8E5l3VJ7PHh7HrEWEzlTeYEd+EYVnaAxT2Aa0=;\n h=Date:Subject:To:Cc:References:From:In-Reply-To;\n b=lAT2qSUHuoEwqwRLjmkbtBWjbcFl5UWpOpb9frJC2Ld8AhDdQv866r1fIPVgbBQid\n LqAxw/l5jkk2ehte8FrQ/xdKJke7mDrhQUWi7xIg4wgthPehs/1CVWgMXFtS2UOHzk\n ksXvVjMSRWzXhslLqEp+VAO+RX+PEd/6mK3iZ+Ct8Mz/jVRs+cUjCZTjhtq8fPG99a\n Zp6ixA3hPRVA80TKTAQqqgbiXO/Z2RRMbHanANxAVUa3BDqZbAP+C36TqTv0NdrWp3\n hSftSd5On44Shdhnzzh3b656T6GUp2yRr6Ui7QpMHWeHEtp/0kbueaVsJb2l9w1XSl\n 7roQ4VdmQVyPg==","X-Mailman-Original-Authentication-Results":["smtp3.osuosl.org;\n dmarc=pass (p=reject dis=none)\n header.from=bubu1.eu","smtp3.osuosl.org;\n dkim=pass (2048-bit key) header.d=bubu1.eu header.i=@bubu1.eu\n header.a=rsa-sha256 header.s=bubu header.b=lAT2qSUH"],"Subject":"Re: [Buildroot] [PATCH] package/systemd: security bump to v258.7","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","From":"Marcus Hoffmann via buildroot <buildroot@buildroot.org>","Reply-To":"Marcus Hoffmann <buildroot@bubu1.eu>","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"}},{"id":3682113,"web_url":"http://patchwork.ozlabs.org/comment/3682113/","msgid":"<20260424162702.161430-1-thomas.perale@mind.be>","list_archive_url":null,"date":"2026-04-24T16:27:02","subject":"Re: [Buildroot] [PATCH] package/systemd: security bump to v258.7","submitter":{"id":87308,"url":"http://patchwork.ozlabs.org/api/people/87308/","name":"Thomas Perale","email":"thomas.perale@mind.be"},"content":"In reply of:\n> This fixes the following vulnerabilities:\n> \n> - CVE-2026-29111:\n>     systemd, a system and service manager, (as PID 1) hits an assert and\n>     freezes execution when an unprivileged IPC API call is made with\n>     spurious data. On version v249 and older the effect is not an assert,\n>     but stack overwriting, with the attacker controlled content. From\n>     version v250 and newer this is not possible as the safety check causes\n>     an assert instead. This IPC call was added in v239, so versions older\n>     than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11\n>     contain patches. No known workarounds are available.\n>     https://www.cve.org/CVERecord?id=CVE-2026-29111\n> \n> - CVE-2026-40226:\n>     In nspawn in systemd 233 through 259 before 260, an escape-to-host\n>     action can occur via a crafted optional config file.\n>     https://www.cve.org/CVERecord?id=CVE-2026-40226\n>     https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx\n> \n> Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>\n\nApplied to 2026.02.x. Thanks\n\n> ---\n>  package/systemd/systemd.hash | 2 +-\n>  package/systemd/systemd.mk   | 2 +-\n>  2 files changed, 2 insertions(+), 2 deletions(-)\n> \n> diff --git a/package/systemd/systemd.hash b/package/systemd/systemd.hash\n> index d5a97ffcbd..e96d3ba7ad 100644\n> --- a/package/systemd/systemd.hash\n> +++ b/package/systemd/systemd.hash\n> @@ -1,5 +1,5 @@\n>  # sha256 locally computed\n> -sha256  5c95e54e555b21594ab11e76f91a092c6383553ed725292eb0a929bf2fe028ae  systemd-258.4.tar.gz\n> +sha256  6bd311c25f00d634ae3b4544d582e27df0d4166e6ba3d403b18b3129d7f44cae  systemd-258.7.tar.gz\n>  sha256  ac4985facb553559981f507982444d779115e3e3a4c8b7847ae956198490c1b3  LICENSE.GPL2\n>  sha256  6d9bb3b7fc818a8facc4cc296060a0883fef8710d6498f86165335846e82ee9d  LICENSE.LGPL2.1\n>  sha256  c9e7bf5b7c243c719b8b43c36158effb9b54c5e80abc9d82e4b2d4b2a4aa64ad  LICENSES/alg-sha1-public-domain.txt\n> diff --git a/package/systemd/systemd.mk b/package/systemd/systemd.mk\n> index 4b488857fd..9ce4f8fef2 100644\n> --- a/package/systemd/systemd.mk\n> +++ b/package/systemd/systemd.mk\n> @@ -19,7 +19,7 @@\n>  # - Diff sysusers.d with the previous version\n>  # - Diff factory/etc/nsswitch.conf with the previous version\n>  #   (details are often sprinkled around in README and manpages)\n> -SYSTEMD_VERSION = 258.4\n> +SYSTEMD_VERSION = 258.7\n>  SYSTEMD_SITE = $(call github,systemd,systemd,v$(SYSTEMD_VERSION))\n>  SYSTEMD_LICENSE = \\\n>  \tLGPL-2.1+, \\\n> -- \n> 2.53.0\n> \n> _______________________________________________\n> buildroot mailing list\n> buildroot@buildroot.org\n> https://lists.buildroot.org/mailman/listinfo/buildroot","headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=SymJtEVc;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g2JJc5chcz1y2d\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Sat, 25 Apr 2026 02:27:12 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 6589084D96;\n\tFri, 24 Apr 2026 16:27:11 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id a59613_cocyo; Fri, 24 Apr 2026 16:27:10 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 73E3984E28;\n\tFri, 24 Apr 2026 16:27:10 +0000 (UTC)","from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])\n by lists1.osuosl.org (Postfix) with ESMTP id B8A0B206\n for <buildroot@buildroot.org>; Fri, 24 Apr 2026 16:27:07 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp1.osuosl.org (Postfix) with ESMTP id 9F09C84E6F\n for <buildroot@buildroot.org>; Fri, 24 Apr 2026 16:27:07 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id xkG3g-u5Ufor for <buildroot@buildroot.org>;\n Fri, 24 Apr 2026 16:27:06 +0000 (UTC)","from mail-wr1-x431.google.com (mail-wr1-x431.google.com\n [IPv6:2a00:1450:4864:20::431])\n by smtp1.osuosl.org (Postfix) with ESMTPS id E3FAF84D9A\n for <buildroot@buildroot.org>; Fri, 24 Apr 2026 16:27:05 +0000 (UTC)","by mail-wr1-x431.google.com with SMTP id\n ffacd0b85a97d-43d734223e4so5545705f8f.0\n for <buildroot@buildroot.org>; Fri, 24 Apr 2026 09:27:05 -0700 (PDT)","from arch ([79.132.248.48]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4e3a341sm66471866f8f.24.2026.04.24.09.27.02\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 24 Apr 2026 09:27:02 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp1.osuosl.org 73E3984E28","OpenDKIM Filter v2.11.0 smtp1.osuosl.org E3FAF84D9A"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1777048030;\n\tbh=YakzKNayl7gl1Ncce/mfbEThclfZhvU8SMuttK1i38Y=;\n\th=To:Cc:Date:In-Reply-To:References:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From:Reply-To:From;\n\tb=SymJtEVcN2dDwFp8bKHXhyztGw9pqEIghc0sfakiYlhVlGCn3t9PZcPC6tGT9olX8\n\t PxDKnRwL0LkHgbbwUY1P3/V1XuP5EGByXE5tXrg2UJ/D43CKA/tvFTymStxN96aFi7\n\t qP9wEAo2Ds5u0fjkTT8kWn2PEPbCRI+Hb0ErU6gFASLZeT1JQsqJxy7Nq6aPs/fABc\n\t D7GPpKFYoC/Lo0ekF1L4TdJi3LvIZGNxjYjscN0OmDOE2rh2fnKDlvt20CXKqT+5lS\n\t 1t7BcZGwqXF20cuG9miyQDYfcuiP8hKT6QDe0oXbRA/7DhKeMZYKYNQbt0khbGvqdx\n\t UfVaDGz+etzSg==","Received-SPF":"Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::431; helo=mail-wr1-x431.google.com;\n envelope-from=thomas.perale@essensium.com; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp1.osuosl.org E3FAF84D9A","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777048024; x=1777652824;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=GxKCalkyN1tTcvzYkD6PQV0ZAGJIVRZNBhTDA7fCAnM=;\n b=hBgVO7sJS848CwDbudE3Y0SVgtlnWZjyZxtHPQgrfEKTs089+71+/2aRs4KlhDC+ul\n 2ugX7eZ0lNdnOgTZ2NXehuBXkxJH8JWx7YFoeYrnw6EBozB4O3FZsafU6ixc0tMaANOx\n eGibLRepP+Gn5H1vaEn/d6zjBrHOJL+U1D9o2dD9kpWZoomeeD/+N14qG1FM+K6NBPpZ\n 82VmSHVBSR8kpqXlbibUR0XfZ+ASfpX+PM4+aCa+QYm27AkmWzte/meos77mld1Epk63\n oCwE6OleMojzIEO4o2Y4BCHTLBbMlfESMUQN4W59yMZL+Wty8sDVLNdwjAjQwxHaLYFA\n mKzg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8QiRoM42Yq9AaJBsxmd5vqTAspVNEfgFkdEPGA4M7HR7lye7LS0mu0RkQHiA3iBUHwOU6WyBjBTUA=@buildroot.org","X-Gm-Message-State":"AOJu0YwaRKZ0Zv3GlerVN26pmaagUxmMj5xlcoO6Jj5JfOIxs2cx0Od9\n Rw7YtXHN7vHfT6UolwIgeWwZMKDQ5nQfbf0A3nnfwOT+j3QCXYWxQrIG5kZN0XdgmJo=","X-Gm-Gg":"AeBDievgOoS2L/Mo044dSYbfTvYwlQyVGIyUmtKgC2MXQGnLuC6CqmKFpM5Rzd2d/o6\n miSm5Le5N1vDbAvwhKAygR6wAH/9khljYAW0mIxYaZzeqVcIw89zfZA6A1QVvtSorXv6Fa0Cs+y\n evZb0OndZMIL7nKLGBx0cVjqVzNIC4OQQyE1TSYV7kVA+cp+frcMH255ZvRi32buT0qlIOZdgxX\n 684riWSQAVGrsBf5JgH8AZA6v7+jkVgtdooji3N0Wa9rM8L0Taf+4WGvyRArUY+PgVFUHrUYHkc\n 2wS9Zn2lgeGzsjanRgeIdZIizgBRkTrL52X0KW7Th/LGXgNIqAHlaerq2A4GzQ0ZaUNymLI/V9/\n NVfuDQtOnEcHb1JBshCUkmO5Vfs7NMwqfgtKMqNSIuyi65VOW+/PZftgDFOQrV+LJat/4OGd3GC\n eqJWkBf6AIlMLnF0otMu15u2LK0w==","X-Received":"by 2002:a05:6000:290c:b0:43d:772d:2b61 with SMTP id\n ffacd0b85a97d-43fe4073831mr48472436f8f.15.1777048023803;\n Fri, 24 Apr 2026 09:27:03 -0700 (PDT)","To":"Titouan Christophe <titouan.christophe@mind.be>","Cc":"Thomas Perale <thomas.perale@mind.be>,\n\tbuildroot@buildroot.org","Date":"Fri, 24 Apr 2026 18:27:02 +0200","Message-ID":"<20260424162702.161430-1-thomas.perale@mind.be>","X-Mailer":"git-send-email 2.54.0","In-Reply-To":"<20260420095823.2561132-1-titouan.christophe@mind.be>","References":"<20260420095823.2561132-1-titouan.christophe@mind.be>","MIME-Version":"1.0","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=mind.be; s=google; t=1777048024; x=1777652824; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=GxKCalkyN1tTcvzYkD6PQV0ZAGJIVRZNBhTDA7fCAnM=;\n b=P997R553/EiX8yI+DKnJ9kbkPJaUT3qgCHDT8Q9hNiI88i2rk9JgYcMUpguSS/pbL0\n oqfZeRK0X0m92x6Z9cZVtg4tPT01Tdm7kTrqocPWbvt+cOa2BYoKB7te6pK8ieFHeqb0\n BIetj036kgEUFb1ej9lDWNuBINTe5nWUqs034Xs/11N8VJ91V2D4X5MNsht7UK6plSWM\n 8x3cRt0tESX7V/IJqQFLAk7Cii1WIsOcRHlPkOAhNaawlKKMreJiYLZoSU6RoXVndMUs\n 5X7uYB4Co3QRO1KR5I86Y7Jn/4gducSnLf6KIEaHmVKOOeG7/1sCLpt6VVWRTNKFogE3\n uz5w==","X-Mailman-Original-Authentication-Results":["smtp1.osuosl.org;\n dmarc=pass (p=quarantine dis=none)\n header.from=mind.be","smtp1.osuosl.org;\n dkim=pass (2048-bit key) header.d=mind.be header.i=@mind.be\n header.a=rsa-sha256 header.s=google header.b=P997R553"],"Subject":"Re: [Buildroot] [PATCH] package/systemd: security bump to v258.7","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","From":"Thomas Perale via buildroot <buildroot@buildroot.org>","Reply-To":"Thomas Perale <thomas.perale@mind.be>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"}}]