USN-6719-1: util-linux vulnerability
27 March 2024
util-linux could be made to expose sensitive information.
Releases
Packages
- util-linux - miscellaneous system utilities
Details
Skyler Ferrante discovered that the util-linux wall command did not filter
escape sequences from command line arguments. A local attacker could
possibly use this issue to obtain sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6719-2: mount, uuid-runtime, fdisk, util-linux, libblkid1, libblkid-dev, libmount-dev, libfdisk-dev, libmount1, libuuid1, util-linux-locales, bsdutils, libsmartcols1, rfkill, eject, libsmartcols-dev, uuid-dev, libfdisk1, bsdextrautils, util-linux-extra