debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was designed to execute aa-exec from the standard system pathname if the apparmor package is installed, but implements this incorrectly (with a wrong assumption that the specific pathname would remain the same forever), which allows attackers to bypass intended AppArmor restrictions by leveraging the silent loss of this protection mechanism. NOTE: this does not affect systems, such as default Debian stretch installations, on which Tor startup relies on a systemd unit file (instead of this tor.init script).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99933 | Third Party Advisory VDB Entry |
https://bugs.debian.org/869153 | Issue Tracking Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/99933 | Third Party Advisory VDB Entry |
https://bugs.debian.org/869153 | Issue Tracking Mailing List Vendor Advisory |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/99933 - Third Party Advisory, VDB Entry | |
References | () https://bugs.debian.org/869153 - Issue Tracking, Mailing List, Vendor Advisory |
Information
Published : 2017-07-23 20:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11565
Mitre link : CVE-2017-11565
CVE.ORG link : CVE-2017-11565
JSON object : View
Products Affected
debian
- tor
CWE