touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #33668
[Bug 1362469] Re: AppArmor unrequested reply protection generates unallowable denials
@ricmm: I've spent a couple days, in the past, trying to chase down this
bug but didn't have any luck. It is on par, in terms of difficulty to
debug and fix, with the CPU pegging bug that you're trying to solve.
If it has been shown that 1.8 solves the CPU pegging bug, I think
someone should be able to track down the commits that fix that issue
before we'll have a fix for this bug.
** Changed in: dbus (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1362469
Title:
AppArmor unrequested reply protection generates unallowable denials
Status in “dbus” package in Ubuntu:
In Progress
Bug description:
Starting with utopic's dbus 1.8.6-1ubuntu1 package, the new AppArmor
unrequested reply protections can generate some denials that can't
easily be allowed in policy. For example, when running a confined
pasaffe, you see these denials when starting and closing pasaffe:
apparmor="DENIED" operation="dbus_error" bus="session"
error_name="org.freedesktop.DBus.Error.UnknownMethod" mask="send"
name=":1.22" pid=4993 profile="/usr/bin/pasaffe" peer_pid=3624
peer_profile="unconfined"
It isn't obvious how to construct an AppArmor D-Bus rule to allow that
operation. A bare "dbus," rule allows it but that's not acceptable for
profiles implementing tight D-Bus confinement.
The code that implements unrequested reply protections should be
reviewed for issues and, if everything looks good there,
investigations into how to allow the operation that triggers the above
denial should occur.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dbus/+bug/1362469/+subscriptions
References