The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
![]() | Hardcoded credentials | 10 Aug 201815:29 | – | prion |
![]() | CGA-45MG-W595-WHJV | 6 Jun 202412:09 | – | osv |
![]() | cups - security update | 14 Jul 201800:00 | – | osv |
![]() | cups - security update | 11 Jul 201800:00 | – | osv |
![]() | CVE-2018-6553 AppArmor cupsd Sandbox Bypass Due to Use of Hard Links | 10 Aug 201815:00 | – | cvelist |
![]() | CVE-2018-6553 | 11 Jul 201800:00 | – | ubuntucve |
![]() | CVE-2018-6553 | 10 Aug 201815:29 | – | debiancve |
![]() | CVE-2018-6553 | 23 Jul 201808:19 | – | redhatcve |
![]() | CVE-2018-6553 | 10 Aug 201815:29 | – | nvd |
![]() | [SECURITY] [DLA 1426-1] cups security update | 14 Jul 201810:00 | – | debian |
[
{
"platforms": [
"Ubuntu 18.04 LTS"
],
"product": "cups",
"vendor": "n/a",
"versions": [
{
"lessThan": "2.2.7-1ubuntu2.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Ubuntu 17.10"
],
"product": "cups",
"vendor": "n/a",
"versions": [
{
"lessThan": "2.2.4-7ubuntu3.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Ubuntu 16.04 LTS"
],
"product": "cups",
"vendor": "n/a",
"versions": [
{
"lessThan": "2.1.3-4ubuntu0.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Ubuntu 14.04 LTS"
],
"product": "cups",
"vendor": "n/a",
"versions": [
{
"lessThan": "1.7.2-0ubuntu1.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo