[Bug 1262440] Re: It should be possible to grant D-Bus eavesdropping permission to AppArmor confined processes

Launchpad Bug Tracker 1262440 at bugs.launchpad.net
Fri Jan 17 16:25:10 UTC 2014


This bug was fixed in the package dbus - 1.6.18-0ubuntu3

---------------
dbus (1.6.18-0ubuntu3) trusty; urgency=low

  * aa-mediate-eavesdropping.patch: Query AppArmor when confined applications
    attempt to eavesdrop on the bus. See the apparmor.d(5) man page for
    AppArmor syntax details. (LP: #1262440)
  * debian/control: Depend on the apparmor version containing the new
    eavesdrop permission
 -- Tyler Hicks <tyhicks at canonical.com>   Mon, 13 Jan 2014 11:45:21 -0600

** Changed in: dbus (Ubuntu)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1262440

Title:
  It should be possible to grant D-Bus eavesdropping permission to
  AppArmor confined processes

Status in “apparmor” package in Ubuntu:
  Fix Released
Status in “dbus” package in Ubuntu:
  Fix Released

Bug description:
  In 13.10, confined applications could not eavesdrop on a bus. There
  was simply no way for confined applications to be granted permission
  to eavesdrop. This should be configurable in the application's
  AppArmor profile.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1262440/+subscriptions



More information about the foundations-bugs mailing list