The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
References
Link | Resource |
---|---|
https://usn.ubuntu.com/usn/usn-3713-1 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4243 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html | Issue Tracking Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201908-08 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-08-10 08:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-6553
Mitre link : CVE-2018-6553
JSON object : View
CWE
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
cups
- cups