Replies: 6 comments 3 replies
-
Yes, that is a problem. Firefox used to have the same issue, and it has been restricted (See #275). We can easily do the same on |
Beta Was this translation helpful? Give feedback.
-
Nothing we can do at the current state of AppArmor other than to scold developers of these programs for bad application design. |
Beta Was this translation helpful? Give feedback.
-
This vulnerability can be fixed with Linux namespaces. Using Bubblewrap:
It may be a good idea to mark profiles that grant programs too much permissions to |
Beta Was this translation helpful? Give feedback.
-
Since you created this discussion, I checked the use of Finally, I will add a kind profile linter to automatically detect a usage of /tmp that would be too wide. |
Beta Was this translation helpful? Give feedback.
-
In principle, it's possible to solve this without Linux namespaces. A feature of AppArmor such that a file is accessible only to the process that created the file and the processes that received file descriptors of the file. Obviously, this feature should be applied only to files specified in profiles. It would solve the |
Beta Was this translation helpful? Give feedback.
-
https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ |
Beta Was this translation helpful? Give feedback.
-
If a profile for a program X contains a permission like below, X can read other programs' secret data and rewrite other programs' data.
Just a few of such X:
qnapi
,thunderbird
,vidcutter
,vcsi
,calibre
,gajim
.Beta Was this translation helpful? Give feedback.
All reactions