That's correct - it ships unconfined, but when set to complain or enforce
crun is unusable.

 It's fairly common to require all installed apparmor profiles to be set as
enforcing when doing security audits / certifications (or have a damn good
documented reason why it's not), which is how I stumbled over this.

 It was working in Debian 12, though saying that I'm actually not sure if a
crun profile was shipped at all in bookworm.

On Tue, 6 May 2025, 14:48 intrigeri, <intrig...@debian.org> wrote:

> Control: tag -1 + moreinfo
>
> Hi,
>
> Jarl Gullberg (2025-05-02):
> > The AppArmor profile for crun that ships with AppArmor 4.1 in Debian 13
> is currently
> > rendering crun entirely unusable when enabled.
>
> What do you mean with "when enabled" here?
>
> I'm asking because:
>
>  - This profile is intentionally shipped in unconfined mode, as
>    explained in the comment on top of the file.
>
>  - In this default configuration, on current sid, crun fails with
>    "please specify a command", which matches what I understand is your
>    desired successful status, and not the failure (where I would see
>    "Failed to re-execute libcrun via memory file descriptor").
>
> If by "when enabled" you mean "when manually switched from unconfined
> to complain mode", then I think that's 1 other instance of "complain
> mode blocks stuff when it should not", which IIRC is tracked
> upstream somewhere. Other limitations include "'deny' rules will be
> enforced even in complain mode" (quoting aa-complain(8)).
>
> Cheers,
> --
> intrigeri
>

Reply via email to