[Bug 1262440] Re: It should be possible to grant D-Bus eavesdropping permission to AppArmor confined processes
Launchpad Bug Tracker
1262440 at bugs.launchpad.net
Fri Jan 17 15:24:19 UTC 2014
This bug was fixed in the package apparmor - 2.8.0-0ubuntu38
---------------
apparmor (2.8.0-0ubuntu38) trusty; urgency=low
[ Tyler Hicks ]
* 0084-parser-add-dbus-eavesdrop-perm.patch: Add an eavesdrop permission to
the dbus rule type, allowing confined applications to eavesdrop. The only
valid conditional for eavesdrop rules is 'bus'. See the apparmor.d(5) man
page for more information. (LP: #1262440)
[ Steve Beattie ]
* 0085-push-normalize-tree-ops-into-expr-tree-classes.patch: Improve
parser performance in some cases
[ John Johansen ]
* 0086-add-diff-state-compression-to-dfa.patch: Implement differential
state compression in the parser
* 0087-fix-dfa-minimization.patch: Fix a parser bug that caused some DFAs to
not be fully minimized (LP: #1262938)
* 0088-fix-pol-generation-for-small-dfas.patch: Fixes bugs in the parser
when generating policy for some small DFAs
-- Tyler Hicks <tyhicks at canonical.com> Mon, 13 Jan 2014 11:17:42 -0600
** Changed in: apparmor (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1262440
Title:
It should be possible to grant D-Bus eavesdropping permission to
AppArmor confined processes
Status in “apparmor” package in Ubuntu:
Fix Released
Status in “dbus” package in Ubuntu:
Confirmed
Bug description:
In 13.10, confined applications could not eavesdrop on a bus. There
was simply no way for confined applications to be granted permission
to eavesdrop. This should be configurable in the application's
AppArmor profile.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1262440/+subscriptions
More information about the foundations-bugs
mailing list