CVE-2018-7738

Severity
7.8HIGH
EPSS
0.1%
top 78.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7
Latest updateMay 13

Description

In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianutil-linux< 2.31.1-0.5+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-jh5x-7c5f-4c44: In util-linux before 22022-05-13
OSV
CVE-2018-7738: In util-linux before 22018-03-07
CVEList
CVE-2018-7738: In util-linux before 22018-03-06

📋Vendor Advisories

3
Ubuntu
util-linux vulnerability2020-09-17
Red Hat
util-linux: Shell command injection in unescaped bash-completed mount point names2018-03-07
Debian
CVE-2018-7738: bash-completion - In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain...2018

💬Community

2
Bugzilla
CVE-2018-7738 util-linux: Shell command injection in unescaped bash-completed mount point names2018-03-07
Bugzilla
CVE-2018-7738 util-linux: Shell command injection in unescaped bash-completed mount point names [fedora-all]2018-03-07