Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-7035-1

Ubuntu Security Notice 7035-1 - It was discovered that the AppArmor policy compiler incorrectly generated looser restrictions than expected for rules allowing mount operations. A local attacker could possibly use this to bypass AppArmor restrictions in applications where some mount operations were permitted.

Packet Storm
#vulnerability#ubuntu#linux

==========================================================================
Ubuntu Security Notice USN-7035-1
September 25, 2024

apparmor vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Summary:

AppArmor restrictions could be bypassed for rules allowing mount
operations

Software Description:

  • apparmor: Linux security system

Details:

It was discovered that the AppArmor policy compiler incorrectly generated
looser restrictions than expected for rules allowing mount operations. A
local attacker could possibly use this to bypass AppArmor restrictions in
applications where some mount operations were permitted.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
apparmor 3.0.4-2ubuntu2.4

Ubuntu 20.04 LTS
apparmor 2.13.3-7ubuntu5.4

In general, a standard system update will make all the necessary changes.
After this update, applications confined by policies with mount operations
restrictions may need to have the rules updated.

References:
https://ubuntu.com/security/notices/USN-7035-1
https://bugs.launchpad.net/apparmor/+bug/1597017
CVE-2016-1585

Package Information:
https://launchpad.net/ubuntu/+source/apparmor/3.0.4-2ubuntu2.4
https://launchpad.net/ubuntu/+source/apparmor/2.13.3-7ubuntu5.4

Related news

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution