wall in util-linux through 2.40, often installed with setgid tty
permissions, allows escape sequences to be sent to other users’ terminals
through argv. (Specifically, escape sequences received from stdin are
blocked, but escape sequences received from argv are not blocked.) There
may be plausible scenarios where this leads to account takeover.
Author | Note |
---|---|
mdeslaur | USN-6719-1 added patches, but it turned out they were insufficient to completely fix the issue, so -2 was released which removes the setgid bit from the wall and write binaries. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | util-linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | util-linux | < 2.34-0.1ubuntu9.5 | UNKNOWN |
ubuntu | 22.04 | noarch | util-linux | < 2.37.2-4ubuntu3.3 | UNKNOWN |
ubuntu | 23.10 | noarch | util-linux | < 2.39.1-4ubuntu2.1 | UNKNOWN |
ubuntu | 24.04 | noarch | util-linux | < 2.39.3-9ubuntu6 | UNKNOWN |
ubuntu | 14.04 | noarch | util-linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | util-linux | < any | UNKNOWN |
launchpad.net/bugs/cve/CVE-2024-28085
nvd.nist.gov/vuln/detail/CVE-2024-28085
people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
security-tracker.debian.org/tracker/CVE-2024-28085
ubuntu.com/security/notices/USN-6719-1
ubuntu.com/security/notices/USN-6719-2
www.cve.org/CVERecord?id=CVE-2024-28085
www.openwall.com/lists/oss-security/2024/03/27/5