Kees is right,

AppArmor composes capabilities, so as long as AppArmor is loaded
capabilities are being enforced, whether or not applications are
confined or unconfined.  AppArmor's additional capability mediation that
is specified in profiles is applied after standard capability mediation
is applied.

The stacking of the capability module is fake in that AppArmor will
never call into it.  Allowing capability to stack was done because suse
had many customers trying to load the capability module and having it
fail resulted in bug/support requests.  It also has the benefit that
enabling/disabling AppArmor doesn't have to change the initscripts to
load capability.

-- 
apparmor reinitializes caps late in boot
https://bugs.launchpad.net/bugs/136637
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to