[Bug 2079019] Re: Unable to enforce/disable profiles using aa-enforce/aa-disable

2024-11-13 Thread Georgia Garcia
This is the fix upstream: https://gitlab.com/apparmor/apparmor/-/merge_requests/1237/diffs?commit_id=1f4bba0448563b7d1fe4d86c230556ebf8d3805b -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2079019 Tit

[Bug 2083435] Re: AppArmor 4.1.0-beta1 contains an ABI break for aa_log_record

2024-10-01 Thread Georgia Garcia
** Also affects: apparmor (Ubuntu) Importance: Undecided Status: New ** No longer affects: apparmor (Ubuntu) ** Also affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Also affects: apparmor (Ubuntu Oracular) Importance: Undecided Status: New -- You r

[Bug 2047256] Re: Ubuntu 24.04 Some image thumbnails no longer displayed

2024-11-07 Thread Georgia Garcia
Eugenio, do you see any apparmor messages in your system logs? They could be in /var/log/syslog or /var/log/kern.log, or if you have auditd installed /var/log/audit/audit.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs

[Bug 2064672] Re: [SRU] - fixes for apparmor on noble

2024-11-07 Thread Georgia Garcia
You will need to create an AppArmor profile for the AppImage to work using unprivileged user namespaces with privileged operations. Here's a more detailed explanation in a different bug: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2056627/comments/4 -- You received this bug notificati

[Bug 2047256] Re: Ubuntu 24.04 Some image thumbnails no longer displayed

2024-12-11 Thread Georgia Garcia
Hi Eugenio. I appreciate your patience, but we haven't been able to reproduce the issue so we depend on our logs to draw out any conclusion. Is there any change you are using a different software or extension to display your thumbnails other than nautilus directly? Something like gnome-shell-exten

[Bug 2047256] Re: Ubuntu 24.04 Some image thumbnails no longer displayed

2024-12-11 Thread Georgia Garcia
Hi Eugenio. I'm relieved to hear that you are using Desktop Icons NG. That bug is being tracked in https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-desktop-icons-ng/+bug/2064849 as kanschat shared in #41 Good news is that there's already a fix on the way https://salsa.debian.org

[Bug 2089378] Re: bwrap needs an apparmor profile to work

2024-11-22 Thread Georgia Garcia
This profile bypasses the restriction of unprivileged user namespaces, therefore Ubuntu cannot ship it, and we recommend you don't use it as well. If an application calls bwrap with a valid use of unpriv userns, then a profile for that app should be created instead. Let me know if you need any help

[Bug 2095370] Re: AppArmor early policy load not funcitoning

2025-01-23 Thread Georgia Garcia
The bug was caused by a commit [1] in the Ubuntu kernel that would change the kernel features hash based on the status of the userns and io_uring restriction. When the policy cache was generated, userns restriction would be available and the hash under /etc/apparmor/earlypolicy/ would match the set

[Bug 2095370] Re: AppArmor early policy load not funcitoning

2025-01-28 Thread Georgia Garcia
** Description changed: + SRU Justification: + + [Impact] + + The commit being reverted allows the use of runtime information on + AppArmor features, usually located under + /sys/kernel/security/apparmor/features/ + + The set of features is used to calculate the features' hash, used by + AppArm

[Bug 2098148] Re: Cannot log to bindmounted syslog socket within a container due to rsyslogd profile

2025-02-13 Thread Georgia Garcia
Since rsyslog ships its own apparmor profile, I'm adding rsyslog as the affected package and marking apparmor as invalid. ** Also affects: rsyslog (Ubuntu) Importance: Undecided Status: New ** Changed in: apparmor Status: New => Invalid -- You received this bug notification bec

[Bug 2098838] Re: apparmor appears to deny wpasupplicant on plucky, breaking wifi

2025-02-21 Thread Georgia Garcia
Hi Dave There's a new apparmor_4.1.0~beta5-0ubuntu5 available in plucky-proposed that should remove the wpa_supplicant apparmor profile. We decided to disable it by default for now in Ubuntu I added a comment in the upstream MR for the profile fix, feel free to add more details there if you wish

[Bug 2098838] Re: apparmor appears to deny wpasupplicant on plucky, breaking wifi

2025-02-24 Thread Georgia Garcia
Hi Heinrich. Did you try rebooting after upgrading to 4.1.0~beta5-0ubuntu5? The profile could still be loaded in the kernel thus enforcing restrictions unless rebooting or manually unloading the profile. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subs

[Bug 2095370] Re: AppArmor early policy load not funcitoning

2025-02-20 Thread Georgia Garcia
Verification completed on noble kernel 6.8.0-56.58: $ journalctl -b | grep systemd | grep -i apparmor ... Feb 20 09:50:03 sec3-noble-amd64 kernel: audit: type=1400 audit(1740055803.156:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="busybox" pid=1 comm="systemd" Feb 20

[Bug 2098930] Re: openvpn profile doesn't allow access to files on home dir

2025-02-20 Thread Georgia Garcia
hi Thomas To allow access to these files, you can add the following rule to /etc/apparmor.d/local/openvpn: @{HOME}/Documents/canonical/vpn/canonical_ta.key r, It can be done by the following command: sudo bash -c "echo '@{HOME}/Documents/canonical/vpn/canonical_ta.key r,' >> /etc/apparmor.d/loc

[Bug 2098838] Re: apparmor appears to deny wpasupplicant on plucky, breaking wifi

2025-02-20 Thread Georgia Garcia
Hi Khairul. Unfortunately the fix was not complete and there's a 4.1.0~beta5-0ubuntu5 on the way. What you can do now is unload the profile and remove it. # apparmor_parser --remove /etc/apparmor.d/wpa_supplicant # rm /etc/apparmor.d/wpa_supplicant -- You received this bug notification because

[Bug 2098929] Re: new mbsync profile doesn't work when .mbsyncrc is symlinked

2025-02-20 Thread Georgia Garcia
Hi Thomas, thanks for the report AppArmor resolves the symbolic link on mediation, so to allow mbsync to access those files, you can add the following permission to /etc/apparmor.d/local/mbsync @{HOME}/dotfiles/isync/.mbsyncrc r, It can be done by the following command: sudo bash -c "echo '@{HO

[Bug 2077336] Re: Creation of armv7l vm fails due to tpm-tis

2025-02-26 Thread Georgia Garcia
Hi Bryce, yes I'm able to help with testing. I was able to reproduce the issue on a virtualized jammy using my tpm device as passthrough (I had to manually add apparmor permission to access /dev/tpm* rw, though... another bug). And I was also able to verify that the version from Sergio's PPA works

[Bug 2095370] Re: AppArmor early policy load not funcitoning

2025-02-27 Thread Georgia Garcia
Verification completed on oracular linux/6.11.0-21.21 georgia@sec-oracular-amd64:~$ uname -a Linux sec-oracular-amd64 6.11.0-21-generic #21-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 19 16:50:40 UTC 2025 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-oracular-amd64:~$ journalctl -b | grep systemd | grep -i

[Bug 481661] Re: Add Google Chrome to ubuntu-browsers

2025-02-18 Thread Georgia Garcia
Hi Fred, What is the output of "realpath /usr/bin/google-chrome" in our machine? Here I have $ realpath /usr/bin/google-chrome /opt/google/chrome/google-chrome which is already covered by the rule /opt/google/chrome{,-beta,-unstable}/google-chrome{,-beta,-unstable} Cx -> sanitized_helper, App

[Bug 2077336] Re: Creation of armv7l vm fails due to tpm-tis

2025-02-19 Thread Georgia Garcia
hi Lukas. Yes, I was reproducing it on my host with real hardware. Unfortunately I have since upgraded to noble, so I'm unable to test unless I downgrade the packages (let me know if you'd like me to) Regarding TPM, I'm not sure what to look for, but here's what I got $ cat /sys/class/tpm/tpm0/t

[Bug 481661] Re: Add Google Chrome to ubuntu-browsers

2025-02-19 Thread Georgia Garcia
Hi Fred, I'm sorry to hear that things are not working as you expect. If you can, could you open a new bug here on launchpad or in the upstream apparmor repo https://gitlab.com/apparmor/apparmor/-/issues containing the details of what's not working for you? It would be very helpful if you could inc

[Bug 2100015] Re: apparmor breaks flatpak and firejail

2025-02-27 Thread Georgia Garcia
** Changed in: apparmor (Ubuntu) Assignee: (unassigned) => Georgia Garcia (georgiag) ** Changed in: apparmor (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchp

[Bug 2100015] Re: apparmor breaks flatpak and firejail

2025-02-28 Thread Georgia Garcia
I could reproduce this issue on linux 6.12 but plucky is soon moving to 6.14 in which this is no longer reproducible. ** Changed in: apparmor (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 2067900] Re: apparmor unconfined profile blocks pivot_root

2025-02-27 Thread Georgia Garcia
Verification completed in oracular linux/6.11.0-21.21. Works as expected. georgia@sec-oracular-amd64:~$ uname -a Linux sec-oracular-amd64 6.11.0-21-generic #21-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 19 16:50:40 UTC 2025 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-oracular-amd64:~$ sudo lxc launch ubu

[Bug 2067900] Re: apparmor unconfined profile blocks pivot_root

2025-02-27 Thread Georgia Garcia
Hi The Owl, my apologies. I updated the description containing the SRU justification with the thorough testing steps. Here's the correct verification: root@sec-oracular-amd64:~# lxc launch ubuntu:24.10 test -c security.nesting=true Launching test root@sec-oracular-amd64:~# lxc exec test bash root

<    1   2