Control: severity -1 important

Hi,

On Tue, Dec 24, 2019 at 06:33:58PM +0100, Mattia Monga wrote:
> Package: snapd
> Version: 2.42.1-1
> Severity: grave
> Tags: security
> Justification: user security hole

You didn't really explain how this is a security hole. You just asked for the
default setting to be different. Downgrading.

Cheers,

Ivo

> If one installs the example snap hello-world and launches hello-world.evil in 
> apparmored system the application is NOT strictly confined by default.
> 
> ~$ snap run hello-world.evil
> Hello Evil World!
> This example demonstrates the app confinement
> You should see a permission denied error next
> If you see this line the confinement is not working correctly, please file a 
> bug
> 
> 
> My snap debug info
> 
> ~$ snap debug confinement
> partial
> 
> ~$ snap debug sandbox-features
> apparmor:             kernel:caps kernel:domain kernel:file kernel:mount 
> kernel:namespaces kernel:network_v8 kernel:policy kernel:ptrace kernel:query 
> kernel:rlimit kernel:signal parser:unsafe policy:downgraded 
> support-level:partial
> confinement-options:  classic devmode
> dbus:                 mediated-bus-access
> kmod:                 mediated-modprobe
> mount:                freezer-cgroup-v1 layouts mount-namespace 
> per-snap-persistency per-snap-profiles per-snap-updates 
> per-snap-user-profiles stale-base-invalidation
> seccomp:              bpf-actlog bpf-argument-filtering kernel:allow 
> kernel:errno kernel:kill_process kernel:kill_thread kernel:log kernel:trace 
> kernel:trap kernel:user_notif
> udev:                 device-cgroup-v1 tagging
> 
> I believe the default setting should be "strict" or, at least, the package 
> should have clear documentation on how to enable the strict mode (which, 
> according to upstream, is the default...) 
> 

Reply via email to