openSUSE 10 Security Update : apparmor (apparmor-1842)

This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes security problems in the AppArmor confinment

Since it adds new flags to the profile syntax, you likely should
review and adapt your profiles.

- If a profile allowed unconfined execution ('ux') of a
child binary it was possible to inject code via
LD_PRELOAD or similar environment variables into this
child binary and execute code without confiment.

We have added new flag 'Ux' (and 'Px' for 'px') which
makes the executed child clear the most critical
environment variables (similar to setuid programs).
Special care needs to be taken nevertheless that this
interaction between parent and child programs can not be
exploited in other ways to gain the rights of the child

- If a resource is marked as 'r' in the profile it was
possible to use mmap with PROT_EXEC flag set to load
this resource as executable piece of code, making it
effectively 'ix'.

This could be used by a coordinated attack between two
applications to potentially inject code into the reader.

To allow mmap() executable access, supply the 'm' flag
to the applications profile.

Please also review the updated documentation.

Solution :

Update the affected apparmor packages.

Risk factor :


Family: SuSE Local Security Checks

Nessus Plugin ID: 27153 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now