www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Vulnerability in util-linux Package Raises Security Concerns for Linux Users
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > Vulnerability in util-linux Package Raises Security Concerns for Linux Users
How-To-GuidesIT/Cybersecurity Best PracticesMalware

Vulnerability in util-linux Package Raises Security Concerns for Linux Users

riviTMedia Research
Last updated: April 1, 2024 11:08 pm
riviTMedia Research
Share
Vulnerability in util-linux Package Raises Security Concerns for Linux Users
SHARE

A recently identified vulnerability affecting the “wall” command in the util-linux package has sent ripples of concern through the Linux community. Dubbed CVE-2024-28085 and named WallEscape,, this flaw poses a significant threat to the security of Linux systems. The vulnerability allows unprivileged users to manipulate terminal output, potentially leading to password leaks or clipboard alterations on select Linux distributions.

Contents
Understanding CVE-2024-28085Addressing the IssueConcurrent Threat: CVE-2024-1086Removal Guide and Best PracticesDetection Names and Similar ThreatsRemoval Guide

Understanding CVE-2024-28085

The vulnerability, traced back to a commit made in August 2013, arises from improperly filtered escape sequences in the “wall” command’s command-line arguments. Exploitation of this vulnerability occurs when the “mesg” utility is enabled, and the “wall” command is executed with setgid permissions. Affected systems, such as Ubuntu 22.04 and Debian Bookworm, are at risk of password leakage, with users potentially being tricked into disclosing their credentials. Notably, systems like CentOS remain unaffected due to differences in command permissions.

Furthermore, the vulnerability opens avenues for attackers to manipulate users’ clipboards through escape sequences, particularly on terminals like Windows Terminal. However, GNOME Terminal remains immune to these manipulations.

Addressing the Issue

To mitigate the risks associated with CVE-2024-28085, users are strongly advised to update their util-linux package to version 2.40 promptly. This update contains patches to remedy the vulnerability and ensure the security of Linux systems.

Concurrent Threat: CVE-2024-1086

Coinciding with the disclosure of CVE-2024-28085 is another Linux vulnerability identified by security researcher notselwyn. Assigned CVE-2024-1086, this vulnerability targets the netfilter subsystem of the Linux kernel, potentially leading to local privilege escalation or denial-of-service conditions. However, a commit released on January 24, 2024, has resolved this issue, ensuring the continued security of Linux systems.

Removal Guide and Best Practices

Detection Names and Similar Threats

Detection names for CVE-2024-28085 and CVE-2024-1086 may vary depending on the security software being used. However, some common identifiers might include:

  • CVE-2024-28085 (WallEscape)
  • CVE-2024-1086 (Netfilter Vulnerability)

Similar threats to these vulnerabilities may exploit other package or kernel weaknesses to compromise Linux systems. Staying updated on security advisories and promptly applying patches is crucial for safeguarding against such threats.

Removal Guide

If you suspect your Linux system is affected by CVE-2024-28085 or CVE-2024-1086, follow these steps to mitigate the risks:

  1. Update util-linux: Ensure your util-linux package is updated to version 2.40 or higher. You can do this using your package manager (e.g., apt on Debian-based systems, yum on CentOS).
  2. Apply kernel patches: If your system is vulnerable to CVE-2024-1086, apply the latest kernel patches to address the netfilter vulnerability.
  3. Monitor system logs: Regularly check system logs for any suspicious activities or unauthorized access attempts.
  4. Implement access controls: Restrict access to sensitive commands and utilities to authorized users only. Utilize mechanisms like sudo to manage privileges effectively.
  5. Educate users: Train users to recognize and report suspicious activities promptly. Encourage strong password practices and discourage sharing credentials.
  6. Use secure terminals: Opt for terminals with robust security features, such as GNOME Terminal, to minimize the risk of clipboard manipulation through escape sequences.
  7. Stay informed: Keep abreast of security advisories and updates from trusted sources to remain proactive in addressing emerging threats.

By following these guidelines and maintaining vigilance, Linux users can mitigate the risks posed by vulnerabilities like CVE-2024-28085 and CVE-2024-1086, ensuring the security and integrity of their systems.

You Might Also Like

SnipBot Malware: Understanding the Threat and How to Remove It
BlackHeart Ransomware
AI Tab Optimizer Plus: A Sophisticated Threat to Your Browser’s Health
Bpant Ransomware: Removal and Prevention
Interpol Email Virus: Detection, Removal, and Prevention
TAGGED:LinuxMalware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Omcaterpieom.com: A Deceptive Cyber Threat Lurking in Plain Sight
Next Article Beware of Aucaint.com: A Deceptive Browser Hijacker
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US