Activity log for bug #1226569

Date Who What changed Old value New value Message
2013-09-17 12:09:25 Jamie Strandboge bug added bug
2013-09-17 12:09:35 Jamie Strandboge nominated for series Ubuntu Saucy
2013-09-17 12:09:35 Jamie Strandboge bug task added libhybris (Ubuntu Saucy)
2013-10-17 17:12:25 Launchpad Janitor libhybris (Ubuntu): status New Confirmed
2013-11-26 20:25:54 Jamie Strandboge description Ubuntu SDK applications that use qtdeclarative5-qtmultimedia-plugin to access the camera create the /run/shm/hybris_shm_data shared memory file. This results in an AppArmor rule like the following: /{,var/}run/shm/hybris_shm_data rw, But this rule seems too lenient and breaks application isolation because a malicious app could attack shared memory of other applications. Therefore, these paths need to be made application specific. One suggestion is to use something like (pseudocode): app_pkgname = $APP_ID.split('_')[0] path = "%s-%s", HYBRIS_SHM_PATH, app_pkgname shm_open(path, O_RDWR, 0660) The APP_ID can be obtained from the environment. Reading hooks_shm.c, it is not clear if all apps from the users session are intended to use the same shared memory segment. If so that's the case and if someone explain how a malicious app can't attack /run/shm/hybris_shm_data to affect other apps, then this bug can be marked Invalid. Ubuntu SDK applications that use qtdeclarative5-qtmultimedia-plugin to access the camera create the /run/shm/hybris_shm_data shared memory file. This results in an AppArmor rule like the following:   /{,var/}run/shm/hybris_shm_data rw, But this rule seems too lenient and breaks application isolation because a malicious app could attack shared memory of other applications. Therefore, these paths need to be made application specific. One suggestion is to use something like (pseudocode):   app_pkgname = $APP_ID.split('_')[0]   path = "%s-%s", HYBRIS_SHM_PATH, app_pkgname   shm_open(path, O_RDWR, 0660) The APP_ID can be obtained from the environment. Reading hooks_shm.c, it is not clear if all apps from the users session are intended to use the same shared memory segment. If so that's the case and if someone explain how a malicious app can't attack /run/shm/hybris_shm_data to affect other apps, then this bug can be marked Invalid. Note: when we moved to gstreamer 1.2 in 13.10, all apps needed this access, not just apps using qtdeclarative5-qtmultimedia-plugin.
2013-12-12 18:08:25 Jamie Strandboge nominated for series Ubuntu Trusty
2013-12-12 18:08:25 Jamie Strandboge bug task added libhybris (Ubuntu Trusty)
2013-12-12 18:08:34 Jamie Strandboge libhybris (Ubuntu Saucy): status Confirmed Won't Fix
2014-02-07 10:55:21 Prabindh Sundareson bug added subscriber Prabindh Sundareson