On 09/18/2017 07:21 PM, linux maillist wrote:
> 
> 
>>> This raises some questions to me. First, does dac_override honor the
>>> folder permission rules within the profile? For example, if there is a
>>> rule "/foo/** r," does dac_override this rule?
>>> (...)
>> So gpg was run as root and tried to read, write, or execute, a file
>> (or write to a directory) that it did not have access to via the usual
>> Unix permissions. It was able to operate on the file because it was run
>> as root and had CAP_DAC_OVERRIDE in its effective permissions.
> 
> Thanks for explanation. Things look clearer now.
> But, one thing I still don´t get. Isn´t there a collision between
> dac_override and permission rules in AA profiles?
> 
> Assume I have such a read only rule in the profile:
> 
> audit capability dac_override,
> /tmp/foo r,
> 
> does dac_override now grant write access to /tmp/foo or does the rule
> /tmp/foo r, have more priority than dac_override? To me this looks like
> a permission collision  I am not sure how it get handled....
> 
When there is an overlap, both checks are applied so you will need both
the apparmor rule permissions and dac_override.


-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor

Reply via email to