** Description changed:

  Ubuntu SDK applications that use qtdeclarative5-qtmultimedia-plugin to access 
the camera create the /run/shm/hybris_shm_data shared memory file. This results 
in an AppArmor rule like the following:
-   /{,var/}run/shm/hybris_shm_data rw,
+   /{,var/}run/shm/hybris_shm_data rw,
  
  But this rule seems too lenient and breaks application isolation because a 
malicious app could attack shared memory of other applications. Therefore, 
these paths need to be made application specific. One suggestion is to use 
something like (pseudocode):
-   app_pkgname = $APP_ID.split('_')[0]
-   path = "%s-%s", HYBRIS_SHM_PATH, app_pkgname
-   shm_open(path, O_RDWR, 0660)
+   app_pkgname = $APP_ID.split('_')[0]
+   path = "%s-%s", HYBRIS_SHM_PATH, app_pkgname
+   shm_open(path, O_RDWR, 0660)
  
  The APP_ID can be obtained from the environment. Reading hooks_shm.c, it
  is not clear if all apps from the users session are intended to use the
  same shared memory segment. If so that's the case and if someone explain
  how a malicious app can't attack /run/shm/hybris_shm_data to affect
  other apps, then this bug can be marked Invalid.
+ 
+ Note: when we moved to gstreamer 1.2 in 13.10, all apps needed this
+ access, not just apps using qtdeclarative5-qtmultimedia-plugin.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1226569

Title:
  libhybris should use an app-specific path for shared memory files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libhybris/+bug/1226569/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to