[PATCH][SRU][xenial] UBUNTU: SAUCE: apparmor: flock mediation is not being, enforced on cache check

John Johansen john.johansen at canonical.com
Mon Aug 12 21:59:35 UTC 2019


On 8/12/19 7:56 AM, Kleber Souza wrote:
> On 8/6/19 1:26 AM, John Johansen wrote:
>> When an open file with cached permissions is checked for the flock
>> permission. The cache check fails and falls through to no error instead
>> of auditing, and returning an error.
>>
>> For the fall through to do a permission check, so it will audit the
>> failed flock permission check.
>>
>> BugLink: http://bugs.launchpad.net/bugs/1838090
> 
> The above BugLink doesn't work. Is this bug report flagged as private?
> 
> 
yes it was marked private security

it is also marked now as a duplicate of 
https://bugs.launchpad.net/apparmor/+bug/1658219/

which is public so I have switched it to public as well


> Kleber
> 
>> BugLink: http://bugs.launchpad.net/bugs/1658219
>> Signed-off-by: John Johansen <john.johansen at canonical.com>
>> ---
>>  security/apparmor/file.c | 13 +++++++++----
>>  1 file changed, 9 insertions(+), 4 deletions(-)
>>
>> diff --git a/security/apparmor/file.c b/security/apparmor/file.c
>> index 69eed1c3e0d0..646d3effd0f9 100644
>> --- a/security/apparmor/file.c
>> +++ b/security/apparmor/file.c
>> @@ -536,18 +536,23 @@ static int __file_path_perm(const char *op, struct aa_label *label,
>>  	error = fn_for_each_not_in_set(flabel, label, profile,
>>  			profile_path_perm(op, profile, &file->f_path, buffer,
>>  					  request, &cond, flags, &perms));
>> -	if (denied) {
>> +	if (denied && !error) {
>>  		/* check every profile in file label that was not tested
>>  		 * in the initial check above.
>>  		 */
>>  		/* TODO: cache full perms so this only happens because of
>>  		 * conditionals */
>>  		/* TODO: don't audit here */
>> -		last_error(error,
>> -			fn_for_each_not_in_set(label, flabel, profile,
>> +		if (label == flabel)
>> +			error = fn_for_each(label, profile,
>> +				profile_path_perm(op, profile, &file->f_path,
>> +						  buffer, request, &cond, flags,
>> +						  &perms));
>> +		else
>> +			error = fn_for_each_not_in_set(label, flabel, profile,
>>  				profile_path_perm(op, profile, &file->f_path,
>>  						  buffer, request, &cond, flags,
>> -						  &perms)));
>> +						  &perms));
>>  	}
>>  	if (!error)
>>  		update_file_ctx(file_ctx(file), label, request);
>>
> 




More information about the kernel-team mailing list