MGASA-2024-0112

Source
https://advisories.mageia.org/MGASA-2024-0112.html
Import Source
https://advisories.mageia.org/MGASA-2024-0112.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0112
Related
Published
2024-04-06T19:53:46Z
Modified
2024-04-06T19:40:52Z
Summary
Updated util-linux packages fix security vulnerability
Details

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. (CVE-2024-28085)

References
Credits

Affected packages

Mageia:9 / util-linux

Package

Name
util-linux
Purl
pkg:rpm/mageia/util-linux?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38.1-1.1.mga9

Ecosystem specific

{
    "section": "core"
}