First published: Thu Feb 25 2016(Updated: )
runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/util-linux | 2.36.1-8+deb11u2 2.38.1-5+deb12u1 2.40.2-1 2.40.2-6 | |
util-linux mount | =2.24.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2779 has been assigned a medium severity rating due to its potential to allow local users to escape to the parent session.
To fix CVE-2016-2779, update the util-linux package to version 2.36.1-8+deb11u2, 2.38.1-5+deb12u1, or 2.40.2-1 or higher.
CVE-2016-2779 affects the util-linux package, specifically versions prior to the patched updates mentioned.
The exploit vector for CVE-2016-2779 is a crafted TIOCSTI ioctl call that targets local user sessions.
As of now, there are no widely reported attacks specifically exploiting CVE-2016-2779, but its vulnerability poses a risk to local user environments.