kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #30031
[Bug 1236455] [NEW] Running tasks are not subject to reloaded policies
You have been subscribed to a public bug:
As of saucy, if you start /usr/bin/foo under an existing policy defined
in /etc/apparmor.d/usr.bin.foo, then reload /etc/apparmor.d/usr.bin.foo
with updated permissions, then the running tasks is not subject to the
new permissions.
A testcase is at http://people.canonical.com/~serge/aa_exec.tgz . This
passes in precise, and fails in saucy.
This came up in the libvirt regression testsuite. When it tries to
virsh attach-device, then the existing libvirt task's policy must be
updated to allow it to access the new device image file. The test fails
with EACCESS trying to open the image file after loading the new policy.
** Affects: apparmor
Importance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu)
Importance: High
Status: Confirmed
** Affects: linux (Ubuntu Saucy)
Importance: High
Status: Fix Committed
** Affects: linux (Ubuntu Trusty)
Importance: High
Status: Confirmed
** Tags: application-confinement
--
Running tasks are not subject to reloaded policies
https://bugs.launchpad.net/bugs/1236455
You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.