[ubuntu/xenial-proposed] apparmor 2.10.95-0ubuntu2.1 (Accepted)
Tyler Hicks
tyhicks at canonical.com
Fri Jul 29 07:08:40 UTC 2016
apparmor (2.10.95-0ubuntu2.1) xenial; urgency=medium
* debian/patches/r3460-ignore-file-events-with-send-or-receive-request.patch:
Prevent an aa-logprof crash by ignoring file events that contains
send or receive in the request mask. (LP: #1577051, LP: #1582374)
* debian/patches/r3463-r3475-change-profile-exec-modes.patch: Allow policy
authors to specify if the environment should scrubbed during exec
transitions allowed by a change_profile rule. (LP: #1584069)
* debian/patches/r3478-make-overlapping-safe-and-unsafe-rules-conflict.patch:
Make sure that multiple change_profile rules with overlapping safe and
unsafe exec modes conflict when they share the same exec conditional
(LP: #1588069)
* debian/patches/r3488-r3489-fix-racy-onexec-test.patch: Fix racy regression
test so that the kernel SRU process is not interrupted by the onexec.sh
periodically failing. (LP: #1528230)
* debian/patches/r3490-utils-handle-change-profile-exec-modes.patch: Update
the Python utilities to handle the new exec mode keywords in
change_profile rules. (LP: #1584069)
* debian/patches/r3492-allow-dbus-user-session-path.patch: Allow read/write
access to the dbus-user-session socket file in profiles that include the
dbus-session-strict abstraction. (LP: #1604872)
Date: Thu, 28 Jul 2016 11:02:11 -0500
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/apparmor/2.10.95-0ubuntu2.1
-------------- next part --------------
Format: 1.8
Date: Thu, 28 Jul 2016 11:02:11 -0500
Source: apparmor
Binary: apparmor apparmor-utils apparmor-profiles apparmor-docs libapparmor-dev libapparmor1 libapparmor-perl libapache2-mod-apparmor libpam-apparmor apparmor-notify python-libapparmor python3-libapparmor python-apparmor python3-apparmor dh-apparmor apparmor-easyprof
Architecture: source
Version: 2.10.95-0ubuntu2.1
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Description:
apparmor - user-space parser utility for AppArmor
apparmor-docs - documentation for AppArmor
apparmor-easyprof - AppArmor easyprof profiling tool
apparmor-notify - AppArmor notification system
apparmor-profiles - profiles for AppArmor Security policies
apparmor-utils - utilities for controlling AppArmor
dh-apparmor - AppArmor debhelper routines
libapache2-mod-apparmor - changehat AppArmor library as an Apache module
libapparmor-dev - AppArmor development libraries and header files
libapparmor-perl - AppArmor library Perl bindings
libapparmor1 - changehat AppArmor library
libpam-apparmor - changehat AppArmor library as a PAM module
python-apparmor - AppArmor Python utility library
python-libapparmor - AppArmor library Python bindings
python3-apparmor - AppArmor Python3 utility library
python3-libapparmor - AppArmor library Python3 bindings
Launchpad-Bugs-Fixed: 1528230 1577051 1582374 1584069 1588069 1604872
Changes:
apparmor (2.10.95-0ubuntu2.1) xenial; urgency=medium
.
* debian/patches/r3460-ignore-file-events-with-send-or-receive-request.patch:
Prevent an aa-logprof crash by ignoring file events that contains
send or receive in the request mask. (LP: #1577051, LP: #1582374)
* debian/patches/r3463-r3475-change-profile-exec-modes.patch: Allow policy
authors to specify if the environment should scrubbed during exec
transitions allowed by a change_profile rule. (LP: #1584069)
* debian/patches/r3478-make-overlapping-safe-and-unsafe-rules-conflict.patch:
Make sure that multiple change_profile rules with overlapping safe and
unsafe exec modes conflict when they share the same exec conditional
(LP: #1588069)
* debian/patches/r3488-r3489-fix-racy-onexec-test.patch: Fix racy regression
test so that the kernel SRU process is not interrupted by the onexec.sh
periodically failing. (LP: #1528230)
* debian/patches/r3490-utils-handle-change-profile-exec-modes.patch: Update
the Python utilities to handle the new exec mode keywords in
change_profile rules. (LP: #1584069)
* debian/patches/r3492-allow-dbus-user-session-path.patch: Allow read/write
access to the dbus-user-session socket file in profiles that include the
dbus-session-strict abstraction. (LP: #1604872)
Checksums-Sha1:
369124da65b4312169ef6c615ed3ce2529ff50a5 3252 apparmor_2.10.95-0ubuntu2.1.dsc
b765863b534b00f1ac26be2a5a76ff258a3ace62 91184 apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Checksums-Sha256:
ac70713360c918a122dde86df65b168b7bbe562c9ecf9b2de506d1adde83531d 3252 apparmor_2.10.95-0ubuntu2.1.dsc
ac48a8ca27557d7a9948fe0aef201182505c3d8dc6aba00864e3bb25e97df373 91184 apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Files:
7988cfbf45f6ba0ae48a65f3c20318ae 3252 admin extra apparmor_2.10.95-0ubuntu2.1.dsc
1aabbed2bb36f6ebb0f4add15d91f094 91184 admin extra apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Original-Maintainer: Debian AppArmor Team <pkg-apparmor-team at lists.alioth.debian.org>
More information about the Xenial-changes
mailing list