[USN-4008-2] AppArmor update

Severity Low
Affected Packages 16
CVEs 1

Several policy updates were made for running under the recently updated Linux kernel.

USN-4008-1 fixed multiple security issues in the Linux kernel. This update
provides the corresponding changes to AppArmor policy for correctly
operating under the Linux kernel with fixes for CVE-2019-11190. Without
these changes, some profile transitions may be unintentionally denied due
to missing mmap ('m') rules.

Original advisory details:

Robert Święcki discovered that the Linux kernel did not properly apply
Address Space Layout Randomization (ASLR) in some situations for setuid elf
binaries. A local attacker could use this to improve the chances of
exploiting an existing vulnerability in a setuid elf binary.
(CVE-2019-11190)

It was discovered that a null pointer dereference vulnerability existed in
the LSI Logic MegaRAID driver in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash). (CVE-2019-11810)

It was discovered that a race condition leading to a use-after-free existed
in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux
kernel. The RDS protocol is disabled via blocklist by default in Ubuntu. If
enabled, a local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2019-11815)

Federico Manuel Bento discovered that the Linux kernel did not properly
apply Address Space Layout Randomization (ASLR) in some situations for
setuid a.out binaries. A local attacker could use this to improve the
chances of exploiting an existing vulnerability in a setuid a.out binary.
(CVE-2019-11191)

As a hardening measure, this update disables a.out support.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/python3-libapparmor?distro=xenial ubuntu python3-libapparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/python3-apparmor?distro=xenial ubuntu python3-apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/python-libapparmor?distro=xenial ubuntu python-libapparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/python-apparmor?distro=xenial ubuntu python-apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/libpam-apparmor?distro=xenial ubuntu libpam-apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/libapparmor1?distro=xenial ubuntu libapparmor1 < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/libapparmor-perl?distro=xenial ubuntu libapparmor-perl < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/libapparmor-dev?distro=xenial ubuntu libapparmor-dev < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/libapache2-mod-apparmor?distro=xenial ubuntu libapache2-mod-apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/dh-apparmor?distro=xenial ubuntu dh-apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor?distro=xenial ubuntu apparmor < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor-utils?distro=xenial ubuntu apparmor-utils < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor-profiles?distro=xenial ubuntu apparmor-profiles < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor-notify?distro=xenial ubuntu apparmor-notify < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor-easyprof?distro=xenial ubuntu apparmor-easyprof < 2.10.95-0ubuntu2.11 xenial
Affected pkg:deb/ubuntu/apparmor-docs?distro=xenial ubuntu apparmor-docs < 2.10.95-0ubuntu2.11 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...