Hello, Am Dienstag, 31. Januar 2023, 19:20:38 CET schrieb Antoine Beaupré: > so something is happening with apparmor here. it looks like profile > are "piling up" in some way, with something like this: > > /usr/sbin/sshd//null-/usr/bin/bash//null-/usr/bin/sudo//null-/usr/bin/ > apt//null-/usr/bin/dash//null-/usr/bin/etckeeper//null-/etc/etckeeper/ > pre-install.d/50uncommitted-changes//null-/usr/bin/etckeeper//null-/us > r/bin/perl
That means sshd executed /usr/bin/bash (without having an execute rule),
and bash executed /usr/bin/sudo, which executed /usr/bin/apt, and so on.
I'm somewhat surprised about that because the upstream profile for sshd
has the following rule since Dec 3 2016 :
/{usr/,}bin/bash Uxr,
This rule should allow to execute /bin/bash and /usr/bin/bash in
unconfined mode (= without AppArmor restrictions) - and therefore should
also avoid the long chain you see.
However, your log looks like your profile does not allow executing
/usr/bin/bash.
Now I wonder - does your sshd profile lack this line/rule?
(If in doubt, please attach the complete profile.)
Regards,
Christian Boltz
--
But you are probably also complaining if local root exploits in the
kernel are fixed, because now you no longer can use that to become root
easily... [Stefan Seyfried in opensuse-factory]
signature.asc
Description: This is a digitally signed message part.

