Backport Bind mount malicious library to test unauthorized access
- Jan 05, 2022
-
-
Frederic Danis authored
Bind mount the malicious library in a place accessible by the loader and not blocked by AppArmor, i.e. in place of an existing library, allowing test that AppArmor will block the malicious behavior. Signed-off-by:
Frédéric Danis <frederic.danis@collabora.com>
-
Frederic Danis authored
Merge commit '3e4dea3e' into wip/fdanis/v2022-7333-apparmor-malicious-test
-
- Dec 08, 2021
-
-
Frederic Danis authored
This will allow to create the architecture library path like `/usr/lib/arm-linux-gnueabihf/`. Signed-off-by:
Frédéric Danis <frederic.danis@collabora.com>
-
Frederic Danis authored
Signed-off-by:
Frédéric Danis <frederic.danis@collabora.com>
-
- Dec 03, 2021
-
-
The `test/common` repository uses `apertis/v20*` branches, not `main` or `master`. `common-subtree.sh` is using the current branch from the working test repo to infer which remote branch to import: if it's not in the `apertis/*` form, retrieve the latest branch from the `test/common` repository. Signed-off-by:
Frédéric Danis <frederic.danis@collabora.com>
-
- Oct 13, 2021
-
-
Frederic Danis authored
This script fails when LD_LIBRARY_PATH is not set before calling it and calling script has `nounset` option set. Signed-off-by:
Frédéric Danis <frederic.danis@collabora.com>
-