Name | CVE-2024-28085 |
Description | wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3782-1, DSA-5650-1 |
Debian Bugs | 1067849 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
util-linux (PTS) | bullseye (security), bullseye | 2.36.1-8+deb11u2 | fixed |
bookworm | 2.38.1-5+deb12u2 | fixed | |
bookworm (security) | 2.38.1-5+deb12u1 | fixed | |
sid, trixie | 2.40.2-12 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
util-linux | source | buster | 2.33.1-0.1+deb10u1 | DLA-3782-1 | ||
util-linux | source | bullseye | 2.36.1-8+deb11u2 | DSA-5650-1 | ||
util-linux | source | bookworm | 2.38.1-5+deb12u1 | DSA-5650-1 | ||
util-linux | source | (unstable) | 2.39.3-11 | 1067849 |
https://www.openwall.com/lists/oss-security/2024/03/27/5
https://github.com/util-linux/util-linux/commit/404b0781f52f7c045ca811b2dceec526408ac253 (v2.40)