[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile
authorAlex Murray <alex.murray@canonical.com>
Wed, 17 Nov 2021 04:13:41 +0000 (14:43 +1030)
committerAlex Murray <alex.murray@canonical.com>
Tue, 29 Nov 2022 12:01:21 +0000 (12:01 +0000)
commite9f5c82763ee24af02f0cd787287365eda667532
tree1063e7cc80030fc6552eb421cf7bd6c871598f54
parent5b0f02be13c9bd2297b15bb9666b94e18f36277b
[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile

The snap-confine AppArmor profile cargo-culted a work-around for the
handling of encryptfs encrypted home directories from the AppArmor
base abstraction. Unfortunately this includes permission to execute
arbitrary binaries from within the user's Private home directory
and so could be used to trick snap-confine to execute arbitrary
user-controlled binaries, which when combined with other flaws in
snap-confine could then be used to try and escape confinement.

Signed-off-by: Alex Murray <alex.murray@canonical.com>
Gbp-Pq: Topic cve202144730
Gbp-Pq: Name 0014-cmd-snap-confine-Remove-execute-permission-from-AppA.patch
cmd/snap-confine/snap-confine.apparmor.in