CVE-2024-28085
Published: 27 March 2024
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
Notes
Author | Note |
---|---|
mdeslaur | USN-6719-1 added patches, but it turned out they were insufficient to completely fix the issue, so -2 was released which removes the setgid bit from the wall and write binaries. |
Priority
Status
Package | Release | Status |
---|---|---|
util-linux Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Released
(2.34-0.1ubuntu9.5)
|
|
jammy |
Released
(2.37.2-4ubuntu3.3)
|
|
mantic |
Released
(2.39.1-4ubuntu2.1)
|
|
trusty |
Needs triage
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
|
Patches: upstream: https://github.com/util-linux/util-linux/commit/404b0781f52f7c045ca811b2dceec526408ac253 |