Hi. While thinking how to implement my idea <https://lists.ubuntu.com/archives/apparmor/2021-November/012368.html>, I've come up with the following question.

Suppose that a sysadmin creates a profile containing

```

profile $N $E {

    include $RP

}

```

where $RP is the file path provided by a user. What are ways for the user to be malicious? The most obvious one is when the user writes

```

}

profile $NM $EM {

    $RM

```

into the file referred by $RP. This allegedly replaces the contents of profile $NM with $RM which is not what the sysadmin intended.

Reading the `include_filename` function in `parser/parser_lex.l` and my experiment gave me an impression that this attack is totally possible. Is there any way to protect from it?


--
AppArmor mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor

Reply via email to