CVE-2024-28085

Publication date 27 March 2024

Last updated 24 July 2024


Ubuntu priority

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

Read the notes from the security team

Status

Package Ubuntu Release Status
util-linux 24.10 oracular
Fixed 2.39.3-9ubuntu6
24.04 LTS noble
Fixed 2.39.3-9ubuntu6
23.10 mantic
Fixed 2.39.1-4ubuntu2.1
22.04 LTS jammy
Fixed 2.37.2-4ubuntu3.3
20.04 LTS focal
Fixed 2.34-0.1ubuntu9.5
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Notes


mdeslaur

USN-6719-1 added patches, but it turned out they were insufficient to completely fix the issue, so -2 was released which removes the setgid bit from the wall and write binaries.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
util-linux

References

Related Ubuntu Security Notices (USN)

    • USN-6719-1
    • util-linux vulnerability
    • 27 March 2024
    • USN-6719-2
    • util-linux vulnerability
    • 10 April 2024

Other references