There are two issues being reported here:
1. the access to /run/udev/data: this is bug #883045
2. the @{HOME} rw access

The profile mentions why this is needed:
  # This is need for saving files in your home directory without an extension.
  # Changing this to '@{HOME}/** r' makes it require an extension and more
  # secure (but with 'rw', we still have abstractions/private-files-strict in
  # effect).

and also has the many dangerous paths blacklisted via abstractions
/private-files and abstractions/evince (not the comment mentions
private-files-strict, but it shouldn't due to limitations there (see
abstractions/evince for why) -- this should be adjust in the profile).

Hadmut, we have been through this before-- Ubuntu is a general purpose
distribution and we cannot deny access to all files in the manner you
keep suggesting because people will just turn off apparmor altogether
(which affects more than this profile). This profile's intent is mostly
to prevent arbitrary code execution, not access to all your data. It
prevents arbitrary execs and writes to things you exec (eg, to ~/bin and
the autostart directories, so it does not open 'all doors'. As such it
provides an additional layer of security that did not exist before. When
combined with toolchain and kernel hardening, it helps provide a more
hostile environment to attackers -- and that in and of itself is useful.

Is your method more secure? Of course. Does the current implementation
provide perfect security? Of course not. Does the current implementation
help provide additional security protections? yes.

Since the thrust of this bug is about the policy and not the udev access
bug, I am not going to mark this as a duplicate of bug #883045. Please
file a new bug and attach a patch if you would like to improve the
profile in a general purpose way.

** Summary changed:

- Faulty/useless apparmor profile
+ apparmor profile provides too much access

** Changed in: evince (Ubuntu)
       Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/900324

Title:
  apparmor profile provides too much access

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evince/+bug/900324/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to