CVE-2018-7738

In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:12

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103367 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103367 - Third Party Advisory, VDB Entry
References () https://bugs.debian.org/892179 - Patch, Third Party Advisory () https://bugs.debian.org/892179 - Patch, Third Party Advisory
References () https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55 - Patch, Third Party Advisory () https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55 - Patch, Third Party Advisory
References () https://github.com/karelzak/util-linux/issues/539 - Issue Tracking, Third Party Advisory () https://github.com/karelzak/util-linux/issues/539 - Issue Tracking, Third Party Advisory
References () https://usn.ubuntu.com/4512-1/ - () https://usn.ubuntu.com/4512-1/ -
References () https://www.debian.org/security/2018/dsa-4134 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4134 - Third Party Advisory

Information

Published : 2018-03-07 02:29

Updated : 2024-11-21 04:12


NVD link : CVE-2018-7738

Mitre link : CVE-2018-7738

CVE.ORG link : CVE-2018-7738


JSON object : View

Products Affected

kernel

  • util-linux