CVE-2016-1585

Published on: 04/22/2019 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L

Certain versions of Apparmor from Canonical contain the following vulnerability:

In all versions of AppArmor mount rules are accidentally widened when compiled.

  • CVE-2016-1585 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.
  • Affected Vendor/Software: URL Logo AppArmor - apparmor version all

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
Bug #1597017 “mount rules grant excessive permissions” : Bugs : AppArmor Issue Tracking
Third Party Advisory
bugs.launchpad.net
text/html
URL Logo MISC bugs.launchpad.net/apparmor/+bug/1597017

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCanonicalApparmorAllAllAllAll
ApplicationCanonicalApparmorAllAllAllAll
  • cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*: