Public bug reported: abstractions/ubuntu-helpers's sanitized_helper which was a Pandora box from from its inception.
It contains: ``` network inet, # line 42 /** rwkl, # line 88 /usr/{,local/}lib*/{,**/}* Pixr, # line 58 ``` what basically means : "stop using apparmor" and access any file on my filesystem and more than enough to cause *grave* damages. (write-mode to everything) The first comment in the profile says: "lenient profile when 'Ux' is desired" and also says: > LP: #851986 until AppArmor utilizes proper environment filtering But ... LP: #851986 is "Won't fix" ... since 2012. Last but not least, more and more programs were made to transition to this almost-Ux mode. ~150 in a default modern installation, namely: akregator alpine amarok anjal apport-bug apturl ark arora audacious2 audacity azureus balsa bangarang banshee banshee-1 bitstormlite btmaketorrentgui chromium{,-browser} citadel clamscan claws-mail cone debconf-communicate decibel deluge{,-gtk,-console} digikam dillo dolphin Dooble dragon dvipdfm dvipdfmx elinks elmo emacsclient.emacs2[2-9] emacsclient.emacs-snapshot emacs-snapshot-gtk eog epiphany epiphany-browser epiphany-webkit esperanza evince evolution exaile file-roller firefox freevo geary gedit gimp* gmerlin gmplayer gnome-appearance-properties gnome-btdownload gnome-gmail gnome-mplayer gwenview gxmms gxmms2 hornsey iceweasel jlgui juk kaffeine kate kazehakase kde4-config kde-open kget kmail kmplayer konqueror krusader ktorrent leafpad libreoffice liferea-add-feed links listen localc lodraw loimpress lowriter lpr lpstat lynx.cur mailody midori mktexpk mktextfm modest mousepad mplayer muine mutt nautilus nautilus-sendto netrik netsurf okular oocalc oodraw ooffice ooimpress oowriter opera pcmanfm plasma-browser-integration-host potamus promoe qbittorrent qmmp quodlibet rhythmbox scim scim-bridge seamonkey shotwell smplayer strange-quark swfdec-player sylpheed thunar thunderbird timidity tkrat totem totem-gstreamer totem-xine transmission{,-gtk,-qt,-cli} {t,T}hunar vim.gnome vlc w3m xarchiver xdg-open xfmedia xmms yelp /opt/brave.com/brave{,-beta,-dev,-nightly}/brave-browser{,-beta,-dev,-nightly} /opt/google/chrome{,-beta,-unstable}/google-chrome{,-beta,-unstable} /usr/lib{,64}/chromium{,-browser}/chromium{,-browser} /usr/lib{,64}/firefox*/firefox* /usr/lib/fennec-*/fennec /usr/lib/GNUstep/Applications/GNUMail.app/GNUMail /usr/lib/icecat-*/icecat /usr/lib/iceweasel/iceweasel /usr/lib/libreoffice/program/soffice /usr/lib/mozilla/kmozillahelper /usr/lib/@{multiarch}/libproxy/*/pxgsettings /usr/lib/openoffice/program/soffice /usr/lib/thunderbird*/thunderbird{,.sh,-bin} /usr/share/minirok/minirok.py /usr/share/software-center/software-center Pinch me if you can't find a way to do hidden & automated arbitrary file access and network exfiltration using one of these (Actually more than one good candidate for such an attack) As commented in #1042771, some of these do have their own profile (evince/LibreOffice) but are set to run uncontrolled anyway. To summarize: Tons of insecure programs are knowingly granted uncontrolled permissions (full fs access + full network access + executing arbitrary programs in /usr/{,local/}lib*/{,**/}* No actual reason is given (the same program, for being called a "helper", becomes trusted and Ux-friendly) and no resolution is even being considered (2012 "Won't fix") and it's been so since at least one decade. The very minimum fix is that to comment these by default: network inet, # line 42 /usr/{,local/}lib*/{,**/}* Pixr, # line 58 and this /** rwkl, # line 88 should be adapted to something a bit more reasonable like @{XDG_CACHE_HOME} & @{XDG_DOWNLOAD_DIR} & /tmp (And LP #1042771 should fine a resolution so that less programs depends on `sanitized_helper` (even less LoC monsters like LibreOffice or firefox) Finally, note that unless I'm mistaken, `abstractions/ubuntu-helpers` stating `usr/bin/firefox Cxr -> sanitized_helper` (to take one example), means that launching firefox from totem or any media-players makes it run unconfined, meanwhile it is when ran directly from the user. This sounds absurd and a serious hole in the apparmor security model. ** Affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Tags: aa-policy -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor in Ubuntu. https://bugs.launchpad.net/bugs/2102694 Title: dangerous "sanitized_helper" contains /** rwkl, Status in apparmor package in Ubuntu: New Bug description: abstractions/ubuntu-helpers's sanitized_helper which was a Pandora box from from its inception. It contains: ``` network inet, # line 42 /** rwkl, # line 88 /usr/{,local/}lib*/{,**/}* Pixr, # line 58 ``` what basically means : "stop using apparmor" and access any file on my filesystem and more than enough to cause *grave* damages. (write-mode to everything) The first comment in the profile says: "lenient profile when 'Ux' is desired" and also says: > LP: #851986 until AppArmor utilizes proper environment filtering But ... LP: #851986 is "Won't fix" ... since 2012. Last but not least, more and more programs were made to transition to this almost-Ux mode. ~150 in a default modern installation, namely: akregator alpine amarok anjal apport-bug apturl ark arora audacious2 audacity azureus balsa bangarang banshee banshee-1 bitstormlite btmaketorrentgui chromium{,-browser} citadel clamscan claws-mail cone debconf-communicate decibel deluge{,-gtk,-console} digikam dillo dolphin Dooble dragon dvipdfm dvipdfmx elinks elmo emacsclient.emacs2[2-9] emacsclient.emacs-snapshot emacs-snapshot-gtk eog epiphany epiphany-browser epiphany-webkit esperanza evince evolution exaile file-roller firefox freevo geary gedit gimp* gmerlin gmplayer gnome-appearance-properties gnome-btdownload gnome-gmail gnome-mplayer gwenview gxmms gxmms2 hornsey iceweasel jlgui juk kaffeine kate kazehakase kde4-config kde-open kget kmail kmplayer konqueror krusader ktorrent leafpad libreoffice liferea-add-feed links listen localc lodraw loimpress lowriter lpr lpstat lynx.cur mailody midori mktexpk mktextfm modest mousepad mplayer muine mutt nautilus nautilus-sendto netrik netsurf okular oocalc oodraw ooffice ooimpress oowriter opera pcmanfm plasma-browser-integration-host potamus promoe qbittorrent qmmp quodlibet rhythmbox scim scim-bridge seamonkey shotwell smplayer strange-quark swfdec-player sylpheed thunar thunderbird timidity tkrat totem totem-gstreamer totem-xine transmission{,-gtk,-qt,-cli} {t,T}hunar vim.gnome vlc w3m xarchiver xdg-open xfmedia xmms yelp /opt/brave.com/brave{,-beta,-dev,-nightly}/brave-browser{,-beta,-dev,-nightly} /opt/google/chrome{,-beta,-unstable}/google-chrome{,-beta,-unstable} /usr/lib{,64}/chromium{,-browser}/chromium{,-browser} /usr/lib{,64}/firefox*/firefox* /usr/lib/fennec-*/fennec /usr/lib/GNUstep/Applications/GNUMail.app/GNUMail /usr/lib/icecat-*/icecat /usr/lib/iceweasel/iceweasel /usr/lib/libreoffice/program/soffice /usr/lib/mozilla/kmozillahelper /usr/lib/@{multiarch}/libproxy/*/pxgsettings /usr/lib/openoffice/program/soffice /usr/lib/thunderbird*/thunderbird{,.sh,-bin} /usr/share/minirok/minirok.py /usr/share/software-center/software-center Pinch me if you can't find a way to do hidden & automated arbitrary file access and network exfiltration using one of these (Actually more than one good candidate for such an attack) As commented in #1042771, some of these do have their own profile (evince/LibreOffice) but are set to run uncontrolled anyway. To summarize: Tons of insecure programs are knowingly granted uncontrolled permissions (full fs access + full network access + executing arbitrary programs in /usr/{,local/}lib*/{,**/}* No actual reason is given (the same program, for being called a "helper", becomes trusted and Ux-friendly) and no resolution is even being considered (2012 "Won't fix") and it's been so since at least one decade. The very minimum fix is that to comment these by default: network inet, # line 42 /usr/{,local/}lib*/{,**/}* Pixr, # line 58 and this /** rwkl, # line 88 should be adapted to something a bit more reasonable like @{XDG_CACHE_HOME} & @{XDG_DOWNLOAD_DIR} & /tmp (And LP #1042771 should fine a resolution so that less programs depends on `sanitized_helper` (even less LoC monsters like LibreOffice or firefox) Finally, note that unless I'm mistaken, `abstractions/ubuntu-helpers` stating `usr/bin/firefox Cxr -> sanitized_helper` (to take one example), means that launching firefox from totem or any media-players makes it run unconfined, meanwhile it is when ran directly from the user. This sounds absurd and a serious hole in the apparmor security model. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2102694/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp