touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #54290
[Bug 1415492] Re: Create a trusted socket for privileged processes
This bug was fixed in the package apparmor-easyprof-ubuntu - 1.2.41
---------------
apparmor-easyprof-ubuntu (1.2.41) 14.09; urgency=medium
[ Alberto Mardegan ]
* ubuntu/accounts: explictly deny access to the p2p socket. This will now be
available only to unconfined apps to support a trusted socket for
privileged processes (LP: #1415492)
-- Jamie Strandboge <jamie@xxxxxxxxxx> Thu, 05 Feb 2015 12:33:59 -0600
** Changed in: apparmor-easyprof-ubuntu (Ubuntu RTM)
Status: Fix Committed => Fix Released
** Changed in: signon-apparmor-extension (Ubuntu RTM)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1415492
Title:
Create a trusted socket for privileged processes
Status in the base for Ubuntu mobile products:
In Progress
Status in apparmor-easyprof-ubuntu package in Ubuntu:
Fix Released
Status in signon package in Ubuntu:
Fix Released
Status in signon-apparmor-extension package in Ubuntu:
Fix Released
Status in apparmor-easyprof-ubuntu package in Ubuntu RTM:
Fix Released
Status in signon-apparmor-extension package in Ubuntu RTM:
Fix Released
Bug description:
We want to let privileged processes (such as those using the
"unconfined" profile template) to access any online account without
having the need of being added to the account's ACL.
signond and libsignon-qt already support connecting via a p2p D-Bus
backed by a unix socket ("$XDG_RUNTIME_DIR/signond/socket"), but it's
currently switched off at build time. We should enable it.
signon-apparmor-extension has to be changed so that a peer connected
via the p2p D-Bus connection will always be treated as "unconfined".
While apparmor policy already disallows access to this socket,
apparmor-easyprof-ubuntu needs to be modified so that the "accounts"
policy will contain an explicity deny rule for
"$XDG_RUNTIME_DIR/signond/socket" to suppress logging the denial.
To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1415492/+subscriptions
References