First published: Fri Aug 10 2018(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =18.04 | |
Linuxcontainers Lxc | >=2.0.0<=2.0.9 | |
Linuxcontainers Lxc | >=3.0.0<3.0.2 | |
SUSE CaaS Platform | =1.0 | |
SUSE CaaS Platform | =2.0 | |
SUSE OpenStack Cloud | =6 | |
SUSE SUSE Linux Enterprise Server | =11-sp3 | |
SUSE SUSE Linux Enterprise Server | =11-sp4 | |
openSUSE Leap | =15.0 | |
debian/lxc | 1:4.0.6-2+deb11u2 1:5.0.2-1+deb12u2 1:6.0.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6556 is a vulnerability in lxc-user-nic where an unprivileged user can open a user provided path, potentially allowing them to check for the existence of a path they wouldn't otherwise be able to reach or trigger side effects.
The severity of CVE-2018-6556 is low with a CVSS score of 3.3.
The affected software includes lxc versions 3.0.1-0ubuntu1~18.04.2, 1:3.1.0+really3.0.3-8, 1:3.1.0+really3.0.3-8+deb10u1, 1:4.0.6-2+deb11u2, 1:5.0.2-1+deb12u1, and 1:5.0.3-1.
To fix CVE-2018-6556, update lxc to version 3.0.1-0ubuntu1~18.04.2 or apply the available patches depending on your distribution.
You can find more information about CVE-2018-6556 at the following references: [link1], [link2], [link3].