Bug#888620: evince: apparmor profile prevents loading git-annex files
Michael Gold
michael at bitplane.org
Thu Sep 20 01:24:42 BST 2018
On Thu, Sep 13, 2018 at 11:47:40 -0500, Jason Crain wrote:
> My understanding is that this limitation is in the Linux kernel's
> security module framework. Symbolic links are resolved before AppArmor
> can verify permission for the path, so AppArmor only sees
> "/xr0/michael/...etc...", not "/home/michael/...etc...".
That makes some sense. It would be reasonable to set different security
policies on different filesystems--even directories within a filesystem,
when fs.protected_hardlinks is in use.
$HOME vs. /xr0 is only part of the problem. The apparmor rules say that
evince can open:
* any file under $HOME
* any file outside of $HOME named *.pdf
What is actually triggering the denial is that the target git-annex path
has no extension. I don't understand the security benefit, because:
* the symlink, its target, and both directories are owned by me and not
writable by anyone else
* anyone trying to exploit users will simply give the file the expected
extension (otherwise people would have trouble opening it)
* harmful files are most likely to be in web/mail download directories,
which are probably under $HOME so don't even get the extension check
-- Michael
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnome-maintainers/attachments/20180919/5249838d/attachment.sig>
More information about the pkg-gnome-maintainers
mailing list