util-linux: User-assisted execution of arbitrary code — GLSA 201803-02

A vulnerability was discovered in util-linux, which could potentially lead to the execution of arbitrary code.

Affected packages

sys-apps/util-linux on all architectures
Affected versions < 2.30.2-r1
Unaffected versions >= 2.30.2-r1

Background

util-linux is a suite of Linux programs including mount and umount, programs used to mount and unmount filesystems.

Description

It was discovered that the umount bash-completion as provided by util-linux does not escap mount point paths.

Impact

An attacker controlling a volume label could entice a user with privileges to mount/umount filesystems to use umount command with auto completion, possibly resulting in execution of arbitrary code with root privileges.

Workaround

Disable Bash-completion or remove “/usr/share/bash-completion/completions/umount”.

Resolution

All util-linux users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.30.2-r1"
 

References

Release date
March 07, 2018

Latest revision
March 07, 2018: 1

Severity
high

Exploitable
local, remote

Bugzilla entries