Lucene search

K
mageiaGentoo FoundationMGASA-2024-0112
HistoryApr 06, 2024 - 10:53 p.m.

Updated util-linux packages fix security vulnerability

2024-04-0622:53:46
Gentoo Foundation
advisories.mageia.org
24
util-linux
security
vulnerability
packages
fix
escape sequences
terminals
account takeover
cve-2024-28085
unix

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.1%

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users’ terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. (CVE-2024-28085)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchutil-linux< 2.38.1-1.1util-linux-2.38.1-1.1.mga9

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.1%