Vulnerability Description
The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cups | Cups | - |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
References
- https://lists.debian.org/debian-lts-announce/2018/07/msg00014.htmlIssue TrackingMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201908-08
- https://usn.ubuntu.com/usn/usn-3713-1Third Party Advisory
- https://www.debian.org/security/2018/dsa-4243Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00014.htmlIssue TrackingMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201908-08
- https://usn.ubuntu.com/usn/usn-3713-1Third Party Advisory
- https://www.debian.org/security/2018/dsa-4243Third Party Advisory
FAQ
What is CVE-2018-6553?
CVE-2018-6553 is a vulnerability with a CVSS score of 8.8 (HIGH). The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2...
How severe is CVE-2018-6553?
CVE-2018-6553 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6553?
Check the references section above for vendor advisories and patch information. Affected products include: Cups Cups, Canonical Ubuntu Linux, Debian Debian Linux.