USN-4008-2: AppArmor update

05 June 2019

Several policy updates were made for running under the recently updated Linux kernel.

Releases

Packages

Details

USN-4008-1 fixed multiple security issues in the Linux kernel. This update
provides the corresponding changes to AppArmor policy for correctly
operating under the Linux kernel with fixes for CVE-2019-11190. Without
these changes, some profile transitions may be unintentionally denied due
to missing mmap ('m') rules.

Original advisory details:

Robert Święcki discovered that the Linux kernel did not properly apply
Address Space Layout Randomization (ASLR) in some situations for setuid elf
binaries. A local attacker could use this to improve the chances of
exploiting an existing vulnerability in a setuid elf binary.
(CVE-2019-11190)

It was discovered that a null pointer dereference vulnerability existed in
the LSI Logic MegaRAID driver in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash). (CVE-2019-11810)

It was discovered that a race condition leading to a use-after-free existed
in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux
kernel. The RDS protocol is blacklisted by default in Ubuntu. If enabled, a
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-11815)

Federico Manuel Bento discovered that the Linux kernel did not properly
apply Address Space Layout Randomization (ASLR) in some situations for
setuid a.out binaries. A local attacker could use this to improve the
chances of exploiting an existing vulnerability in a setuid a.out binary.
(CVE-2019-11191)

As a hardening measure, this update disables a.out support.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-4008-1: linux-image-kvm, linux-image-4.4.0-1047-kvm, linux, linux-image-powerpc-smp, linux-image-raspi2, linux-image-generic, linux-image-4.4.0-150-lowlatency, linux-image-4.4.0-150-powerpc-smp, linux-image-4.4.0-150-powerpc64-emb, linux-image-lowlatency, linux-image-snapdragon, linux-image-4.4.0-1114-snapdragon, linux-image-4.4.0-1084-aws, linux-image-4.4.0-150-powerpc-e500mc, linux-kvm, linux-image-powerpc-e500mc, linux-image-generic-lpae, linux-raspi2, linux-image-4.4.0-150-generic-lpae, linux-image-4.4.0-150-powerpc64-smp, linux-image-powerpc64-emb, linux-image-powerpc64-smp, linux-image-virtual, linux-image-4.4.0-1110-raspi2, linux-aws, linux-image-4.4.0-150-generic, linux-image-aws, linux-snapdragon
  • USN-4008-3: linux-image-4.4.0-150-generic-lpae, linux-image-generic-lts-xenial, linux-image-lowlatency-lts-xenial, linux-image-4.4.0-1045-aws, linux-lts-xenial, linux-image-4.4.0-150-generic, linux-aws, linux-image-4.4.0-150-lowlatency, linux-image-aws, linux-image-generic-lpae-lts-xenial