[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile
authorAlex Murray <alex.murray@canonical.com>
Wed, 17 Nov 2021 04:13:41 +0000 (14:43 +1030)
committerMarkus Koschany <apo@debian.org>
Tue, 13 Jun 2023 09:28:53 +0000 (10:28 +0100)
commita4d207cb157a6ace55100e1ddf6923756f5c30c1
tree2477378b17b5390aa5983bc10ce3122a219533ac
parent7d69dced992cc409aa8ccb1e8d0ed17f9703ea90
[PATCH 14/36] cmd/snap-confine: Remove execute permission from AppArmor profile

The snap-confine AppArmor profile cargo-culted a work-around for the
handling of encryptfs encrypted home directories from the AppArmor
base abstraction. Unfortunately this includes permission to execute
arbitrary binaries from within the user's Private home directory
and so could be used to trick snap-confine to execute arbitrary
user-controlled binaries, which when combined with other flaws in
snap-confine could then be used to try and escape confinement.

Signed-off-by: Alex Murray <alex.murray@canonical.com>
Gbp-Pq: Topic cve202144730
Gbp-Pq: Name 0014-cmd-snap-confine-Remove-execute-permission-from-AppA.patch
cmd/snap-confine/snap-confine.apparmor.in