An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle ‘restart’ operations removing AppArmor profiles that aren’t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what’s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
All posts by 007admin
CVE-2017-5199
The editbanner feature in SolarWinds LEM (aka SIEM) through 6.3.1 allows remote authenticated users to execute arbitrary code by editing /usr/local/contego/scripts/mgrconfig.pl.
Bugtraq: [SECURITY] [DSA 3816-1] samba security update
[SECURITY] [DSA 3816-1] samba security update
RHBA-2017:0840-1: opendaylight bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Networking packages that resolve various issues are now
available for Red Hat OpenStack Platform 10.0 (Newton) for RHEL 7.
RHBA-2017:0839-1: tzdata enhancement update
Red Hat Enterprise Linux: Updated tzdata packages that add one enhancement are now available for Red
Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5
Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat
Enterprise Linux 5.9 Advanced Update Support, Red Hat Enterprise Linux 5, Red
Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4
Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support,
Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise
Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended
Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat
Enterprise Linux 6, Red Hat Enterprise Linux 7.1 Extended Update Support, Red
Hat Enterprise Linux 7.1 Little Endian Extended Update Support, Red Hat
Enterprise Linux 7.2 Extended Update Support, and Red Hat Enterprise Linux 7.
RHBA-2017:0740-3: sanlock bug fix update
Red Hat Enterprise Linux: An update for sanlock is now available for Red Hat Enterprise Linux 6.
RHBA-2017:0669-4: rrdtool bug fix update
Red Hat Enterprise Linux: An update for rrdtool is now available for Red Hat Enterprise Linux 6.
RHBA-2015:2209-8: rrdtool update
Red Hat Enterprise Linux: Updated rrdtool packages are now available for Red Hat Enterprise Linux 7.
USN-3242-1: Samba vulnerability
Ubuntu Security Notice USN-3242-1
23rd March, 2017
samba vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Samba could be made to expose sensitive information over the network.
Software description
- samba
– SMB/CIFS file, print, and login server for Unix
Details
Jann Horn discovered that Samba incorrectly handled symlinks. An
authenticated remote attacker could use this issue to access files on the
server outside of the exported directories.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
samba
2:4.4.5+dfsg-2ubuntu5.4
- Ubuntu 16.04 LTS:
-
samba
2:4.3.11+dfsg-0ubuntu0.16.04.5
- Ubuntu 14.04 LTS:
-
samba
2:4.3.11+dfsg-0ubuntu0.14.04.6
- Ubuntu 12.04 LTS:
-
samba
2:3.6.25-0ubuntu0.12.04.9
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-3243-1: Git vulnerability
Ubuntu Security Notice USN-3243-1
23rd March, 2017
git vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.04 LTS
Summary
Git could be made to run programs as your login if it explored a specially
crafted repository.
Software description
- git
– fast, scalable, distributed revision control system
Details
It was discovered that Git incorrectly sanitized branch names in the PS1
variable when configured to display the repository status in the shell
prompt. If a user were tricked into exploring a malicious repository, a
remote attacker could use this issue to execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.04 LTS:
-
git
1:1.9.1-1ubuntu0.4
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.