On Fri, 18 Jan 2019, Jörg Sommer wrote:

> Package: apparmor
> Version: 2.13.2-3
> Severity: normal
> 
> Hi,
> 
> I've added some rules to profiles shipped with package to better match the
> behaviour of Firefox and Skype. Maybe some of them are helpful and you
> want pick them. Otherwise you're free to close this report.

Thanks for the patch!

> diff -u -r /tmp/aa/etc/apparmor.d/abstractions/dconf 
> /etc/apparmor.d/abstractions/dconf
> --- /tmp/aa/etc/apparmor.d/abstractions/dconf 2019-01-01 19:03:54.000000000 
> +0100
> +++ /etc/apparmor.d/abstractions/dconf        2019-01-11 12:17:18.614182127 
> +0100
> @@ -4,5 +4,5 @@
>  # be specified in a specific application's profile.
>  
>    /etc/dconf/** r,
> -  owner /{,var/}run/user/*/dconf/user r,
> +  owner /{,var/}run/user/*/dconf/user rw,

FYI, we're intentionally avoiding writes in the abstractions.

>    owner @{HOME}/.config/dconf/user r,
> diff -u -r /tmp/aa/etc/apparmor.d/abstractions/fonts 
> /etc/apparmor.d/abstractions/fonts
> --- /tmp/aa/etc/apparmor.d/abstractions/fonts 2019-01-01 19:03:54.000000000 
> +0100
> +++ /etc/apparmor.d/abstractions/fonts        2019-01-18 22:56:20.159428688 
> +0100
> @@ -18,14 +18,14 @@
>    /usr/share/fonts/**                   r,
>  
>    /etc/fonts/**                         r,
> -  /usr/share/fontconfig/conf.avail/**   r,
> +  /usr/share/fontconfig/conf.avail/{,**} r,
>  
>    /opt/kde3/share/fonts/**              r,
>  
>    /usr/lib{,32,64}/openoffice/share/fonts/**    r,
>  
>    /var/cache/fonts/**                   r,
> -  /var/cache/fontconfig/**              mr,
> +  /var/cache/fontconfig/**              rw,

This drops the 'm' in favor of 'w' which is problematic since some applications
mmap fonts (though it would be nice to get rid of the 'm', I'm just not sure we
can without investigation). As for the 'w', I know that you are seeing denials,
but the normal DAC permissions aren't going to let you write here since Skype
and Firefox aren't running as root. Deny rules in abstractions are also avoided
since they can't be undone in other policy. Best to instead use explicit deny
rules in the Skype and Firefox profiles.

>    /var/lib/defoma/**                    mr,
>  
>    /usr/share/a2ps/fonts/**              r,
> @@ -43,7 +43,7 @@
>    owner @{HOME}/.local/share/fonts/**   r,
>    owner @{HOME}/.fonts.cache-2          mr,
>    owner @{HOME}/.{,cache/}fontconfig/   r,
> -  owner @{HOME}/.{,cache/}fontconfig/** mrl,
> +  owner @{HOME}/.{,cache/}fontconfig/** rwlk,

Writes are intentionally not allowed by this profile since the font caches
should typically be updated outside the confined application. Allowing writes
here would allow confined applications to write files that are used as input
for unconfined applications running in the user's session, which could allow
sandbox escape if there a bugs in the font handling libraries.

>    owner @{HOME}/.fonts.conf.d/          r,
>    owner @{HOME}/.fonts.conf.d/**        r,
>    owner @{HOME}/.config/fontconfig/     r,
> diff -u -r /tmp/aa/etc/apparmor.d/abstractions/gnome 
> /etc/apparmor.d/abstractions/gnome
> --- /tmp/aa/etc/apparmor.d/abstractions/gnome 2019-01-01 19:03:54.000000000 
> +0100
> +++ /etc/apparmor.d/abstractions/gnome        2019-01-12 11:19:46.827157086 
> +0100
> @@ -63,6 +63,7 @@
>    owner @{HOME}/.fonts.cache-*    rwl,
>  
Ditto

>    # icon caches
> +  owner @{HOME}/.cache/gtk-3.0/** r,
>    /var/cache/**/icon-theme.cache  r,
>    /usr/share/**/icon-theme.cache  r,
>  
> diff -u -r /tmp/aa/etc/apparmor.d/abstractions/mesa 
> /etc/apparmor.d/abstractions/mesa
> --- /tmp/aa/etc/apparmor.d/abstractions/mesa  2019-01-01 19:03:54.000000000 
> +0100
> +++ /etc/apparmor.d/abstractions/mesa 2019-01-18 21:01:17.727350842 +0100
> @@ -2,6 +2,8 @@
>  # Rules for Mesa implementation of the OpenGL API
>  
>    # System files
> +  /etc/drirc r,
> +  /usr/share/drirc.d/{,*} r,
>    /dev/dri/ r, # libGLX_mesa.so calls drmGetDevice2()
>  
>    # User files
> diff -u -r /tmp/aa/etc/apparmor.d/tunables/alias 
> /etc/apparmor.d/tunables/alias
> --- /tmp/aa/etc/apparmor.d/tunables/alias     2019-01-01 19:03:54.000000000 
> +0100
> +++ /etc/apparmor.d/tunables/alias    2019-01-16 00:20:42.868356851 +0100
> @@ -14,3 +14,5 @@
>  #
>  # Or if mysql databases are stored in /home:
>  # alias /var/lib/mysql/ -> /home/mysql/,
> +
> +alias /bin/sh -> /bin/dash,
> 
This isn't going to be true on all distributions and is probably not a
reasonable default for AppArmor upstream (but indeed might be for the distro of
your choice). Ie, it is possibly ok as a Debian distro patch (needs
discussion).

-- 
Jamie Strandboge             | http://www.canonical.com

Attachment: signature.asc
Description: PGP signature

Reply via email to