Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <gdxwstno6ihmajmbjq3vbdjzgwseiihpdhv234dqzvu443uhdi@s7vcp44ktqls>
Date: Wed, 27 Mar 2024 13:57:12 -0700
From: nightmare.yeah27@...ecat.org
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2024-28085: Escape sequence injection in util-linux wall

On Wed, Mar 27, 2024 at 11:00:00AM -0400, Skyler Ferrante (RIT Student) wrote:

> Wall-Escape (CVE-2024-28085)

> This allows unprivileged users to put arbitrary text on other
> users terminals, if mesg is set to y and wall is setgid. CentOS
> is not vulnerable since wall is not setgid. On Ubuntu 22.04 and
> Debian Bookworm, wall is both setgid and mesg is set to y by
> default.

I wonder how this comes about? I have looked around for a bit,
but the places that seemed relevant -- mostly /etc/default/devpts
and /etc/login.defs -- seem to show it should be 0600 by default.

Something somewhere overrides these, but I can't find that
something anywhere.

-- 
Ian

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.