CVE-2018-7738

Priority
Description
In util-linux before 2.32-rc1, bash-completion/umount allows local users to
gain privileges by embedding shell commands in a mountpoint name, which is
mishandled during a umount command (within Bash) by a different user, as
demonstrated by logging in as root and entering umount followed by a tab
character for autocompletion.
Notes
sbeattiebash completion for umount moved from bash-completion to
util-linux in util-linux 2.28-1
mdeslaurscript in xenial bash-completion package isn't vulnerable
bash-completion package in bionic+ doesn't contain the umount
helper
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (code not present)
Ubuntu 20.10 (Groovy Gorilla):not-affected (code not present)
Package
Upstream:released (2.31.1-0.5)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (2.31.1-0.4ubuntu3.7)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (2.33.1-0.1ubuntu2)
Ubuntu 20.10 (Groovy Gorilla):not-affected (2.33.1-0.1ubuntu2)
Patches:
Upstream:https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55
More Information

Updated: 2020-09-17 12:16:31 UTC (commit 703ab752641410050a9b96af45b11dc27b8b2e2c)