<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Util-Linux — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/util-linux/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 08:08:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/util-linux/feed.xml" rel="self" type="application/rss+xml"/><item><title>util-linux Vulnerability Allows DoS and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2024-04-util-linux-dos-info-disclosure/</link><pubDate>Wed, 22 Apr 2026 08:08:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-util-linux-dos-info-disclosure/</guid><description>A local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.</description><content:encoded><![CDATA[<p>A vulnerability exists within the util-linux package that can be exploited by a local attacker. While specific details regarding the vulnerable component or version are not provided in the advisory, successful exploitation can lead to a denial-of-service (DoS) condition and the disclosure of sensitive information. The impact is limited to systems where the attacker has local access, but successful exploitation could disrupt services and expose sensitive data to unauthorized users. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential disruptions and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a Linux system running a vulnerable version of util-linux.</li>
<li>Attacker identifies a vulnerable utility within the util-linux package. (Specific utility name not provided).</li>
<li>Attacker crafts a malicious input or command designed to trigger the vulnerability.</li>
<li>Attacker executes the malicious input/command using the vulnerable utility.</li>
<li>The vulnerability causes the targeted utility to crash or enter a non-responsive state, contributing to a denial-of-service condition.</li>
<li>The vulnerability allows the attacker to read sensitive information from the system&rsquo;s memory or file system.</li>
<li>Attacker exfiltrates the disclosed information.</li>
<li>Attacker leverages the disclosed information for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to trigger a denial-of-service condition, potentially disrupting critical system services. The attacker can also disclose sensitive information, leading to potential data breaches or further compromise of the system. The number of affected systems is unknown but depends on the prevalence of the vulnerable util-linux version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate the specific vulnerable utility and version within util-linux to determine the scope of impact using OS package management tools (<code>dpkg</code>, <code>rpm</code>).</li>
<li>Monitor process execution for unusual command-line arguments or behaviors associated with util-linux utilities using <code>process_creation</code> logs.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>util-linux</category><category>denial-of-service</category><category>information-disclosure</category><category>linux</category></item></channel></rss>