Linux admins and infosec pros,

A rather sneaky attack has surfaced involving the wall command of the util-linux package that poses a severe security threat to Linux systems. This 'WallEscape' vulnerability has been present in every package version for the past 11 years.

It allows an attacker to exploit escape control characters to create a fake SUDO prompt on other users' terminals, ultimately tricking them into revealing their sensitive information, such as administrator passwords. We explore the security implications of this vulnerability and how to secure your systems against it. 

If you want to see how an attacker could leverage this issue, proof-of-concept exploit code for WallEscape has been published on GitHub.

Please share this newsletter with your friends to help them gain critical Linux security insights. Is there a Linux security-related topic you want to cover for our audience? We welcome contributions from enthusiastic, insightful community members like you!

Other topics covered this week include:

Yours in Open Source,

Brittany Signature 150

Decade-Old Linux 'wall' Bug Helps Generate Fake SUDO Prompts, Threatens Password Security

4.Lock AbstractDigital

A critical vulnerability has been found in the wall command of the util-linux package that poses a severe security threat to Linux systems. This vulnerability, known as WallEscape, has been present in every package version for the past 11 years. It allows an attacker to exploit escape control characters to create a fake SUDO prompt on other users' terminals, ultimately tricking them into revealing their sensitive information, such as administrator passwords. We explore the security implications of this vulnerability and how to secure your systems against it.

Learn How To Protect Against This Bug>

Charting the Course of Cybersecurity Education for Linux Admins

5.ShakingHands

Linux administrators and infosec professionals face rising cyber threats in today's interconnected digital world. As open-source platforms gain more importance, securing them becomes mission-critical for organizations worldwide. We explore the advantages of cybersecurity education and explain how it can transform the careers of Linux admins, infosec professionals, and open-source developers. Gain insights into cybersecurity aspects, job outlook, career possibilities, and why to embrace this exciting field. 

Learn About the Benefits of Cybersecurity Education>

Open Source is Not Insecure, Despite Common Misconceptions

23.Tablet Connections

A common misconception is that open-source software is less secure than proprietary software. To help dispel this myth, we'll highlight the benefits of open-source software in terms of security and show that the trust placed in the open-source community is well-founded. Currently, ninety percent of known exploited vulnerabilities are found in proprietary software, even though around 97% of all software is open-source. It's time to debunk the myth that open-source development is less secure than proprietary development!

Learn About Open-Source Security Benefits>