Bug 1165424

Summary: Should implement sandbox-local '/etc'
Product: [Fedora] Fedora Reporter: Richard Z. <rz>
Component: policycoreutilsAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: unspecified    
Version: 22CC: dwalsh, mgrepl, opensource, plautrba, rz
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-07-19 19:04:15 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Richard Z. 2014-11-18 23:14:26 UTC
Description of problem:

Every application run in a sandbox can read /etc/passwd . In most cases this is a bad idea for a sandboxed application.

Probably many other directories should be sandbox-local.

Comment 1 Till Maas 2015-02-22 12:52:13 UTC
Why is being able to read /etc/passwd a bad idea? It is not /etc/shadow that contains the password hashes...

Comment 2 Richard Z. 2015-02-22 14:00:58 UTC
It should not be possible for a sandboxed app to read out full list of users including real names for example.

I was not claiming this was the worst that a possibly misbehaving app in a sandbox could do.

As it is now sandboxed apps get access to every file in /etc, /proc, /dev, /tmp, /var and probably a few more for which the user has the rights.

Comment 3 Christopher Meng 2015-02-23 01:35:30 UTC
(In reply to Till Maas from comment #1)
> Why is being able to read /etc/passwd a bad idea? It is not /etc/shadow that
> contains the password hashes...

Why is a good idea? Only passwords are significant? Usernames are the best sources for social engineering.

Comment 4 Jaroslav Reznik 2015-03-03 16:31:16 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 22 development cycle.
Changing version to '22'.

More information and reason for this action is here:
https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora22

Comment 5 Fedora End Of Life 2016-07-19 19:04:15 UTC
Fedora 22 changed to end-of-life (EOL) status on 2016-07-19. Fedora 22 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 6 Richard Z. 2016-08-11 12:01:48 UTC
I think this should be reopened against rawhide?