Jon: snapd requires apparmor for essential confinement of untrusted
applications. If you are using an apparmor-capable kernel and have not
explicitly disabled apparmor on boot then apparmor requirement will be
enforced.

You can disable apparmor on boot with a kernel command line argument.
Snapd respects that and disables apparmor enforcement. We want to avoid
accidental misconfiguration to go unnoticed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1803476

Title:
  After reboot, snap-confine has elevated permissions and is not
  confined but should be

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1803476/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to