Let me slightly revise what legovini wrote (and appologies to legovini
who was just passing on my less than adequate explanation).

It is true that giving cap sys_admin is effectively giving a process
root. That doesn't mean we don't do it, but we do it very carefully, and
only after review of the use cases. It is also true that there is no
good solution to separate out the root functionality that cap sys_admin
grants because the kernel conflates several different permissions under
cap sys_admin.

The apparmor confinement will still apply even after granting cap
sys_admin. But it is somewhat weakened. Just how much will depend on
other parts of the profile. And having the profile will be better than
not having it as even weakened it can split appart some of the broad
permissions granted by cap sys_admin.

There is no point in having broken packages due to security, it just
upsets users and leads to users turning off security which is the worst
possible result.

So the question is how useful is clamav when not using OnAccess mode?

If we are going to allow OnAccess,
Is it by default, or an optional configuration?
And what is the best way to allow cap sys_admin?

If necessary the apparmor profile can be updated to allow cap sys_admin,
however it is certainly more desirable (from a security perspective) to
make it optional behind a tunnable or have it commented out by default.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1842695

Title:
  ClamAV AppArmor profiles do not allow OnAccess scanning

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1842695/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to