Add infrastructure to support enabling userns restrictions via sysctl.d file
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
apparmor (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
As per https:/
# AppArmor restrictions of unprivileged user namespaces
# Restrict the use of unprivileged user namespaces to applications
# which have an AppArmor profile loaded which specifies the userns
# permission. All other applications (whether confined by AppArmor
# or not) will be denied the use of unprivileged user namespaces.
#
# See https:/
#
# If it is desired to disable this restriction, it is preferable to
# create an additional file named /etc/sysctl.
# which will override this current file and sets this value to 0
# rather than editing this current file
# THIS IS CURRENTLY DISABLED BUT WILL BE ENABLED IN A FUTURE UPLOAD
# AS DETAILED ABOVE
kernel.
If we enable this currently it would then cause existing applications which use unprivileged user namespaces in Ubuntu to fail - as such, this file will set the sysctl to 0 for now and will be updated in a future upload to enable it, along with a set of apparmor profiles for the various applications in the Ubuntu archive which require the use of unprivileged user namespaces.
description: | updated |
summary: |
- Enable userns restrictions via sysctl.d files + Add infrastructure to support enabling userns restrictions via sysctl.d + files |
description: | updated |
summary: |
Add infrastructure to support enabling userns restrictions via sysctl.d - files + file |
description: | updated |
Changed in apparmor (Ubuntu): | |
status: | New → In Progress |
This bug was fixed in the package apparmor - 4.0.0~alpha2- 0ubuntu2
--------------- alpha2- 0ubuntu2) mantic; urgency=medium
apparmor (4.0.0~
* Fix invalid JSON output from aa-status --json via upstream patch aa_status. c-quiet- verbose- outputs- when-json. patch
(LP: #2032994)
- d/p/u/binutils-
-- Alex Murray <email address hidden> Fri, 25 Aug 2023 09:48:24 +0930