The maverick-proposed packages works fine, see attached log.
~# dpkg -l |grep appar
ii apparmor 2.5.1-0ubuntu0.10.10.2
User-space parser utility for AppArmor
ii apparmor-utils 2.5.1-0ubuntu0.10.10.2
** Attachment added: "aalog.txt"
https://bugs.launchpad.net/bugs/670415/+attachment/1721767/+files/aalog.txt
--
Use of uninitialized value $rmask
https://bugs.launchpad.net/bugs/670415
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Binary package hint: apparmor
When running aa-logprof, no logs are parsed or rules generated. See
attached log file.
For example:
Use of uninitialized value $rmask in substitution (s///) at
/usr/share/perl5/Immunix/SubDomain.pm line 6622, <$LOG> line 1393.
Use of uninitiali
Public bug reported:
Binary package hint: apparmor
aa-logprof doesn't generate (or modify) policies due to missing
abstractions/apache2-common
~# aa-logprof
Can't find include file abstractions/apache2-common: No such file or directory
~#
Audit messages are present in the log file:
~# grep au
The above problem doesn't show up in 9.10.
$ lsb_release -a && sudo dpkg -l |grep apparmor
LSB Version:
core-2.0-ia32:core-2.0-noarch:core-3.0-ia32:core-3.0-noarch:core-3.1-ia32:core-3.1-noarch:core-3.2-ia32:core-3.2-noarch:core-4.0-ia32:core-4.0-noarch
Distributor ID: Ubuntu
Description:U
** Attachment added: "Logs and system information"
http://launchpadlibrarian.net/32006390/apparmor.090918.txt
--
aa-logprof doesn't generate any policies
https://bugs.launchpad.net/bugs/432323
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
Public bug reported:
Binary package hint: apparmor
See attached log for system information and test commands.
Short version:
Even though apparmor events exist in /var/log/messages aa-logprof doesn't
generate any policies.
tho...@thosjo-lab:~$ grep chrom /var/log/messages| tail -n2
Sep
Hi again,
no there wasn't anything unusual about the configuration. Standard installation
on an Dell Latitude laptop.
This problem hasn't occured afterwards so it seems only the
linux-restricted-modules-2.6.27-12-generic was affected by this issue.
--
package linux-restricted-modules-2.6.28-8-
Hi there,
since later versions of this package hasn't had this issue you're free to close
it if you wish.
--
package linux-restricted-modules-2.6.27-11-generic 2.6.27-11.15 failed to
install/upgrade: subprocess post-installation script returned error exit status
32
https://bugs.launchpad.net/b
Removed abstractions and dash from policy and tested again.
No improvement.
** Attachment added: "Stripped Firefox policy and logs"
http://launchpadlibrarian.net/23818814/apparmor.new_firefox.policy
--
jaunty: Apparmor doesn't parse logs and doesnt generally work.
https://bugs.launchpad.net/b
... and here's some new behavior.
Added all previous policies, Apparmor didn't fail to load them this time but
now it didn't unload the policies when stopped instead.
tho...@thosjo-lab:~$ sudo /etc/init.d/apparmor start
Loading AppArmor profiles - AppArmor already loade
Firefox policy and logs
** Attachment added: "Firefox policy and logs"
http://launchpadlibrarian.net/23818577/apparmor.firefox.policy
--
jaunty: Apparmor doesn't parse logs and doesnt generally work.
https://bugs.launchpad.net/bugs/341205
You received this bug notification because you are a m
I removed all policies except dhcp and avahi, and there was no start/stop
issues.
Then I added the Firefox policy and the null-complain-profile started to show
up.
r...@thosjo-lab:/etc/apparmor.d# /etc/init.d/apparmor stop
Unloading AppArmor profiles : done.
r...@thosjo-lab:/etc/apparmor.d# aa
Rebooting didn't help sorry to say.
Also found that the apparmor_parser doesn't handle some of the flags,
--Complain and -d seen below, mentioned in the help text.
tho...@thosjo-lab:~$ uptime && sudo aa-complain
/etc/apparmor.d/usr.lib.firefox-3.0.7.firefox.sh
12:19:46
Intrepid apparmor behavior
** Attachment added: "Intrepid apparmor behavior"
http://launchpadlibrarian.net/23756296/apparmor.ref810.txt
--
jaunty: Apparmor doesn't parse logs and doesnt generally work.
https://bugs.launchpad.net/bugs/341205
You received this bug notification because you are a
** Attachment added: "Jaunty apparmor behavior"
http://launchpadlibrarian.net/23756284/apparmor.904.txt
--
jaunty: Apparmor doesn't parse logs and doesnt generally work.
https://bugs.launchpad.net/bugs/341205
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
The apparmor packages in Jaunty cant be stopped, started or restarted properly.
They can't generate new rules or load previously installed ones either.
Attached is a log (sort of) of the incorrect behavior of apparmor in Jaunty.
Also attached is a reference log from 8.04.
**
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/23145984/Dependencies.txt
** Attachment added: "VarLogDistupgradeAptlog.gz"
http://launchpadlibrarian.net/23145985/VarLogDistupgradeAptlog.gz
** Attachment added: "VarLogDistupgradeApttermlog.gz"
http://launchpadlibra
essing linux-generic (--configure):
dependency problems - leaving unconfigured
Setting up linux-restricted-modules-2.6.27-12-generic (2.6.27-12.17) ...
dpkg: error processing linux-restricted-modules-2.6.27-12-generic (--configure):
Dell Latitude C800:
tho...@thosjo-lab:~$ lspci
00:00.0 Host bridge: Int
Public bug reported:
Generating "future proof" apparmor profiles for Firefox is made more
cumbersome due to the fact that the /usr/lib/firefox directory name is
modified after each upgrade.
tho...@lab:~$ sudo aa-status
apparmor module is loaded.
16 profiles are loaded.
2 profiles are in enforce m
Public bug reported:
Binary package hint: passwd
After installation of Ubuntu Intrepid, the password in /etc/shadow uses
MD5 ($1$) instead of SHA256 ($6$).
/etc/shadow:
thosjo:$1$qwXqg...
Bug #303515:
r...@thosjo-lab:~# passwd thosjo
Enter new UNIX password:
Retype new UNIX password:
Sorry
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/20631668/Dependencies.txt
** Attachment added: "DpkgTerminalLog.gz"
http://launchpadlibrarian.net/20631669/DpkgTerminalLog.gz
--
package linux-restricted-modules-2.6.27-11-generic 2.6.27-11.15 failed to
install/upgrade
processing:
linux-restricted-modules-2.6.27-11-generic
linux-restricted-modules-generic
linux-generic
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 8.10
Release:8.10
Codename: intrepid
r...@thosjo-lab:~# dpkg -l | grep linux-
ii linux-firmware
Public bug reported:
When running the update-manager from gnome it replies with
"An upgrade from 'jaunty' to 'intrepid' is not supported with this tool."
aptitude update && aptitude safe-upgrade works just fine and reports the same
number of upgrades.
After safe-upgrade has completed the icon f
string at
/usr/share/perl5/Immunix/SubDomain.pm line 4395.
Besides the __ratelimits the /var/log/messages looks ok;
Nov 10 17:28:28 thosjo-lab kernel: [258828.456667] type=1502
audit(1226334508.459:34044): operation="socket_getpeername" family="inet"
sock_type="stream" pr
See https://bugs.launchpad.net/opensuse/+source/apparmor/+bug/271252
--
Corrupted AppArmor audit log messages
https://bugs.launchpad.net/bugs/160238
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs
Wouldn't it be better if the openntpd profile were included in the
openntpd package, and replace the ntpd profile when installed?
--
apparmor profile for /usr/sbin/ntpd doesn't work for openntpd
https://bugs.launchpad.net/bugs/269575
You received this bug notification because you are a member of
The new repo doesnt seem to work that well either.
Besides that, aa-logprof doesn't respect when you choose N on the "Create New
User?" question, perhaps a seperate bug report?
aa-logprof output:
= Changed Local Profiles =
The following local profiles were changed. Would you like to save them?
/usr/share/perl5/Immunix/SubDomain.pm line 4395.
Complain-mode changes:
Profile:/sbin/dhclient3
Network Family: inet
Socket Type:dgram
Nov 4 10:44:15 thosjo-lab kernel: [ 2080.629489] type=1505
audit(1225791403.634:5571): operation="profile_replace" name="/sbin/dh
a PAM module
apparmor (2.3+1289-0ubuntu5) intrepid; urgency=high
.
* applied patch by Jesse Michael, launchpad #271252
[EMAIL PROTECTED]:~# lsb_release -a && uname -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 8.10
Release:8.10
Codename:
Applied patch.
I had to add /var/log/kernel to logprof.conf, otherwise it seems to work ok
when it comes to parsing the messages.
# aa-logprof -f /var/log/kernel.0
Reading log entries from /var/log/kernel.0.
Updating AppArmor profiles in /etc/apparmor.d.
Complain-mode changes:
Profile:/
id=4836 profile="/usr/lib/sm.bin/sendmail"
[EMAIL PROTECTED]:~# aa-logprof
Reading log entries from /var/log/messages.
Updating AppArmor profiles in /etc/apparmor.d.
[EMAIL PROTECTED]:~#
[EMAIL PROTECTED]:~# zgrep audit /var/log/* | tail -n 5
/var/log/messages.3.gz:Oct 1 16
Public bug reported:
The result of running aa-logprof makes it very hard to create correct
profiles.
Linux thosjo-laptop 2.6.27-3-generic #1 SMP Wed Sep 10 16:02:00 UTC 2008 i686
GNU/Linux
--
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu intrepid (development
Public bug reported:
Binary package hint: apparmor
~# aa-logprof
Reading log entries from /var/log/messages.
Updating AppArmor profiles in /etc/apparmor.d.
Use of uninitialized value in string eq at
/usr/share/perl5/Immunix/SubDomain.pm line 2146, <$LOG> line 92.
Use of uninitialized value in s
34 matches
Mail list logo