CVE-2018-6553

The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cups:cups:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html - Issue Tracking, Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html - Issue Tracking, Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201908-08 - () https://security.gentoo.org/glsa/201908-08 -
References () https://usn.ubuntu.com/usn/usn-3713-1 - Third Party Advisory () https://usn.ubuntu.com/usn/usn-3713-1 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4243 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4243 - Third Party Advisory

Information

Published : 2018-08-10 15:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6553

Mitre link : CVE-2018-6553

CVE.ORG link : CVE-2018-6553


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

cups

  • cups