[Bug 1262440] Re: It should be possible to grant D-Bus eavesdropping permission to AppArmor confined processes
Launchpad Bug Tracker
1262440 at bugs.launchpad.net
Fri Jan 17 16:25:10 UTC 2014
This bug was fixed in the package dbus - 1.6.18-0ubuntu3
---------------
dbus (1.6.18-0ubuntu3) trusty; urgency=low
* aa-mediate-eavesdropping.patch: Query AppArmor when confined applications
attempt to eavesdrop on the bus. See the apparmor.d(5) man page for
AppArmor syntax details. (LP: #1262440)
* debian/control: Depend on the apparmor version containing the new
eavesdrop permission
-- Tyler Hicks <tyhicks at canonical.com> Mon, 13 Jan 2014 11:45:21 -0600
** Changed in: dbus (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1262440
Title:
It should be possible to grant D-Bus eavesdropping permission to
AppArmor confined processes
Status in “apparmor” package in Ubuntu:
Fix Released
Status in “dbus” package in Ubuntu:
Fix Released
Bug description:
In 13.10, confined applications could not eavesdrop on a bus. There
was simply no way for confined applications to be granted permission
to eavesdrop. This should be configurable in the application's
AppArmor profile.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1262440/+subscriptions
More information about the foundations-bugs
mailing list