CVE-2018-6559

The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.
References
Link Resource
http://www.securityfocus.com/bid/105752 VDB Entry Third Party Advisory
https://launchpad.net/bugs/1793458 Exploit Issue Tracking Third Party Advisory
https://lists.ubuntu.com/archives/kernel-team/2018-October/096172.html Third Party Advisory
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6559.html Third Party Advisory
https://usn.ubuntu.com/3832-1/ Third Party Advisory
https://usn.ubuntu.com/3833-1/ Third Party Advisory
https://usn.ubuntu.com/3835-1/ Third Party Advisory
https://usn.ubuntu.com/3836-1/ Third Party Advisory
https://usn.ubuntu.com/3836-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-10-26 17:29

Updated : 2024-02-28 16:48


NVD link : CVE-2018-6559

Mitre link : CVE-2018-6559

CVE.ORG link : CVE-2018-6559


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor