CVE-2017-11565

Priority
Description
debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was
designed to execute aa-exec from the standard system pathname if the
apparmor package is installed, but implements this incorrectly (with a
wrong assumption that the specific pathname would remain the same forever),
which allows attackers to bypass intended AppArmor restrictions by
leveraging the silent loss of this protection mechanism. NOTE: this does
not affect systems, such as default Debian stretch installations, on which
Tor startup relies on a systemd unit file (instead of this tor.init
script).
Notes
Package
Source: tor (LP Ubuntu Debian)
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (0.2.9.14-1ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.3.1.5-alpha-2)
Ubuntu 19.04 (Disco Dingo):not-affected (0.3.1.5-alpha-2)
Ubuntu 19.10 (Eoan):not-affected (0.3.1.5-alpha-2)
More Information

Updated: 2019-10-18 02:30:22 UTC (commit cccfc4426d8c1fbf582a89d981fe7fc812124543)