CVE-2018-7738

In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*

History

13 Dec 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241213-0002/ -

21 Nov 2024, 04:12

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103367 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103367 - Third Party Advisory, VDB Entry
References () https://bugs.debian.org/892179 - Patch, Third Party Advisory () https://bugs.debian.org/892179 - Patch, Third Party Advisory
References () https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55 - Patch, Third Party Advisory () https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55 - Patch, Third Party Advisory
References () https://github.com/karelzak/util-linux/issues/539 - Issue Tracking, Third Party Advisory () https://github.com/karelzak/util-linux/issues/539 - Issue Tracking, Third Party Advisory
References () https://usn.ubuntu.com/4512-1/ - () https://usn.ubuntu.com/4512-1/ -
References () https://www.debian.org/security/2018/dsa-4134 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4134 - Third Party Advisory

Information

Published : 2018-03-07 02:29

Updated : 2024-12-13 14:15


NVD link : CVE-2018-7738

Mitre link : CVE-2018-7738

CVE.ORG link : CVE-2018-7738


JSON object : View

Products Affected

kernel

  • util-linux