[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile
authorAlex Murray <alex.murray@canonical.com>
Wed, 17 Nov 2021 04:13:41 +0000 (14:43 +1030)
committerMichael Vogt <mvo@debian.org>
Thu, 17 Feb 2022 15:29:46 +0000 (15:29 +0000)
commit5bd183d836b478321b58d99e2fc361f8d7646fc6
tree96cec84cbd73a650152388ae4e3e9d0ba4e97a6e
parent4bc615762fa4dbc024c45ea0663e6e95897f9ca6
[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile

The snap-confine AppArmor profile cargo-culted a work-around for the
handling of encryptfs encrypted home directories from the AppArmor
base abstraction. Unfortunately this includes permission to execute
arbitrary binaries from within the user's Private home directory
and so could be used to trick snap-confine to execute arbitrary
user-controlled binaries, which when combined with other flaws in
snap-confine could then be used to try and escape confinement.

Signed-off-by: Alex Murray <alex.murray@canonical.com>
Gbp-Pq: Topic cve202144730
Gbp-Pq: Name 0014-cmd-snap-confine-Remove-execute-permission-from-AppA.patch
cmd/snap-confine/snap-confine.apparmor.in