CVE-2018-6559

The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105752 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/105752 - Third Party Advisory, VDB Entry
References () https://launchpad.net/bugs/1793458 - Exploit, Issue Tracking, Third Party Advisory () https://launchpad.net/bugs/1793458 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.ubuntu.com/archives/kernel-team/2018-October/096172.html - Third Party Advisory () https://lists.ubuntu.com/archives/kernel-team/2018-October/096172.html - Third Party Advisory
References () https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6559.html - Third Party Advisory () https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6559.html - Third Party Advisory
References () https://usn.ubuntu.com/3832-1/ - Third Party Advisory () https://usn.ubuntu.com/3832-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3833-1/ - Third Party Advisory () https://usn.ubuntu.com/3833-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3835-1/ - Third Party Advisory () https://usn.ubuntu.com/3835-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3836-1/ - Third Party Advisory () https://usn.ubuntu.com/3836-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3836-2/ - Third Party Advisory () https://usn.ubuntu.com/3836-2/ - Third Party Advisory

Information

Published : 2018-10-26 17:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6559

Mitre link : CVE-2018-6559

CVE.ORG link : CVE-2018-6559


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor