Unrated severityNVD Advisory· Published Aug 10, 2018· Updated Sep 16, 2024
AppArmor cupsd Sandbox Bypass Due to Use of Hard Links
CVE-2018-6553
Description
The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
Affected products
12- osv-coords12 versionspkg:apk/chainguard/cupspkg:apk/chainguard/cups-clientpkg:apk/chainguard/cups-devpkg:apk/chainguard/cups-docpkg:apk/chainguard/cups-libspkg:apk/chainguard/ipptoolpkg:apk/wolfi/cupspkg:apk/wolfi/cups-clientpkg:apk/wolfi/cups-devpkg:apk/wolfi/cups-docpkg:apk/wolfi/cups-libspkg:apk/wolfi/ipptool
< 0+ 11 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- security.gentoo.org/glsa/201908-08mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/usn/usn-3713-1mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4243mitrevendor-advisoryx_refsource_DEBIAN
- lists.debian.org/debian-lts-announce/2018/07/msg00014.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.