Lucene search

K
ubuntuUbuntuUSN-6719-2
HistoryApr 10, 2024 - 12:00 a.m.

util-linux vulnerability

2024-04-1000:00:00
ubuntu.com
58
ubuntu
util-linux
vulnerability
fix
command line
permissions
security

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.1%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • util-linux - miscellaneous system utilities

Details

USN-6719-1 fixed a vulnerability in util-linux. Unfortunately, it was
discovered that the fix did not fully address the issue. This update
removes the setgid permission bit from the wall and write utilities.

Original advisory details:

Skyler Ferrante discovered that the util-linux wall command did not filter
escape sequences from command line arguments. A local attacker could
possibly use this issue to obtain sensitive information.

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchutil-linux< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchbsdextrautils< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchbsdextrautils-dbgsym< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchbsdutils< 1:2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchbsdutils-dbgsym< 1:2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarcheject< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarcheject-dbgsym< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchfdisk< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchfdisk-dbgsym< 2.39.1-4ubuntu2.2UNKNOWN
Ubuntu23.10noarchlibblkid-dev< 2.39.1-4ubuntu2.2UNKNOWN
Rows per page:
1-10 of 1011

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.1%