This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
This update fixes security problems in the AppArmor confinment
Since it adds new flags to the profile syntax, you likely should
review and adapt your profiles.
- If a profile allowed unconfined execution ('ux') of a
child binary it was possible to inject code via
LD_PRELOAD or similar environment variables into this
child binary and execute code without confiment.
We have added new flag 'Ux' (and 'Px' for 'px') which
makes the executed child clear the most critical
environment variables (similar to setuid programs).
Special care needs to be taken nevertheless that this
interaction between parent and child programs can not be
exploited in other ways to gain the rights of the child
- If a resource is marked as 'r' in the profile it was
possible to use mmap with PROT_EXEC flag set to load
this resource as executable piece of code, making it
This could be used by a coordinated attack between two
applications to potentially inject code into the reader.
To allow mmap() executable access, supply the 'm' flag
to the applications profile.
Please also review the updated documentation.
Update the affected apparmor packages.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now