Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6507

Опубликовано: 24 мар. 2017
Источник: debian
EPSS Низкий

Описание

An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apparmorfixed2.11.0-3package
apparmorno-dsajessiepackage
apparmorno-dsawheezypackage

Примечания

  • http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647

  • http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648

  • https://bugs.launchpad.net/apparmor/+bug/1668892

  • affects only third-party rules, e.g. from Docker or LXC

  • LXC in wheezy doesn't support proper isolation

EPSS

Процентиль: 56%
0.00337
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 9 лет назад

An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.

CVSS3: 5.9
nvd
почти 9 лет назад

An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.

suse-cvrf
почти 9 лет назад

Security update for apparmor

suse-cvrf
почти 9 лет назад

Security update for apparmor

CVSS3: 5.9
github
больше 3 лет назад

An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.

EPSS

Процентиль: 56%
0.00337
Низкий