> add profile for bwrap utility

Please check that this doesn't make `flatpak run --unshare=network
$APP_ID` regress.

Explanation:

Some Flatpak apps (the ones that have no legitimate reason to use
networking) have `--unshare=network` by default, as a way to prevent
them from contacting the internet if they are malicious or compromised.
This sandboxing feature requires bwrap to use CAP_NET_ADMIN to bring up
a loopback device inside the new network namespace, before it drops
privileges and executes the actual sandboxed code. Otherwise, there
would be no `lo` device and no 127.0.0.1 or ::1, breaking apps'
reasonable expectations.

Many apps *normally* allow networking, but they can all be run with
`--unshare=network` to force the no-network code path, for example
`flatpak run --unshare=network org.gnome.Recipes`. Of course, some or
all features of the app will not work when run like this, but it should
at least start.

I'm hoping that either the new bwrap profile allows this, or the flatpak
profile (previously added) takes precedence and allows CAP_NET_ADMIN to
be used (briefly!) during the switch from the TCB to the sandboxed
environment.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064672

Title:
  [SRU] - fixes for apparmor on noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2064672/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to