USN-6719-1: util-linux vulnerability
27 March 2024
util-linux could be made to expose sensitive information.
Releases
Packages
- util-linux - miscellaneous system utilities
Details
Skyler Ferrante discovered that the util-linux wall command did not filter
escape sequences from command line arguments. A local attacker could
possibly use this issue to obtain sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6719-2: bsdutils, util-linux, libfdisk1, libmount-dev, rfkill, libsmartcols1, uuid-dev, uuid-runtime, libmount1, eject, libsmartcols-dev, libfdisk-dev, mount, fdisk, util-linux-extra, util-linux-locales, libuuid1, libblkid-dev, bsdextrautils, libblkid1