Hello Georgia, or anyone else affected, Accepted apparmor into noble-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/apparmor/4.0.1really4.0.1-0ubuntu0.24.04.3 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- noble to verification-done-noble. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-noble. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: apparmor (Ubuntu Noble) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-noble -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor in Ubuntu. https://bugs.launchpad.net/bugs/2064672 Title: [SRU] - fixes for apparmor on noble Status in apparmor package in Ubuntu: In Progress Status in apparmor source package in Noble: Fix Committed Bug description: [ Impact ] This SRU has several fixes: add unconfined profile for tuxedo-control-center (Bug 2046844) fix issues appointed by coverity fix samba profile (https://gitlab.com/apparmor/apparmor/-/issues/386) fix redefinition of _ which caused an issue with translation, failing aa-enforce (https://gitlab.com/apparmor/apparmor/-/issues/387) add mount test for CVE-2016-1585 (Bug 1597017 and Bug 2023814) add network inet mediation documentation to apparmor.d fix inet conditionals to only generate rules for inet family (https://gitlab.com/apparmor/apparmor/-/issues/384) add unconfined wike profile (Bug 2060810) add unconfined foliate profile (Bug 2060767) fix chromium_browser profile (https://gitlab.com/apparmor/apparmor/-/merge_requests/1208) add profiles for Transmission family of Bittorrent clients add profile for unshare utility (Bug 2046844) add profile for bwrap utility (Bug 2046844) fix unconfined firefox profile to support mozilla.org download (Bug 2056297) fix getattr and setattr perm mapping on mqueue rules (https://gitlab.com/apparmor/apparmor/-/issues/377 and https://gitlab.com/apparmor/apparmor/-/issues/378) fix inet tests (https://gitlab.com/apparmor/apparmor/-/issues/376) fix sshd profile (Bug 2060100) fix apparmor tools to allow mount destination globbing (https://gitlab.com/apparmor/apparmor/-/issues/381) fix firefox profile (https://gitlab.com/apparmor/apparmor/-/issues/380) move pam-related permissions to abstractions/authentication (https://bugzilla.opensuse.org/show_bug.cgi?id=1220032) fix condition in policydb serialization to only encode xtable if kernel_supports_permstable32 relax mount rules in utils to fix use of virtiofs and other file-system types [ Test Plan ] * Make sure to reboot after upgrading (Bug 2072811) This has been extensively tested via the AppArmor regression test script in the QA Regression Testing repo: https://git.launchpad.net/qa-regression-testing/tree/scripts/test-apparmor.py Steps: $ git clone https://git.launchpad.net/qa-regression-testing $ ./scripts/make-test-tarball ./scripts/test-apparmor.py Copying: test-apparmor.py Copying: testlib.py Copying: install-packages Copying: packages-helper Copying: apparmor/ Test files: /tmp/qrt-test-apparmor.tar.gz To run, copy the tarball somewhere, then do: $ tar -zxf qrt-test-apparmor.tar.gz $ cd ./qrt-test-apparmor $ sudo ./install-packages test-apparmor.py $ ./test-apparmor.py -v This script runs various tests against the installed apparmor package, as well as building and running the various upstream regression and other test suites against this installed package: - https://gitlab.com/apparmor/apparmor/-/tree/master/tests/regression/apparmor?ref_type=heads - https://gitlab.com/apparmor/apparmor/-/tree/master/utils/test?ref_type=heads - https://gitlab.com/apparmor/apparmor/-/tree/master/parser/tst?ref_type=heads - https://gitlab.com/apparmor/apparmor/-/tree/master/libraries/libapparmor/testsuite?ref_type=heads The final test output was: ---------------------------------------------------------------------- Ran 62 tests in 1977.045s OK (skipped=3) georgia@sec-noble-amd64:~$ apt policy apparmor apparmor: Installed: 4.0.1really4.0.1-0ubuntu0.24.04.3 Candidate: 4.0.1really4.0.1-0ubuntu0.24.04.3 Run additional tests: 1. Install wike and make sure the wike window opens when executed: $ sudo apt install wike $ wike 2. Install foliate, download test epub and make sure it opens as expected: $ sudo apt install foliate $ wget https://github.com/daisy/epub-accessibility-tests/releases/download/fundamental-2.0/Fundamental-Accessibility-Tests-Basic-Functionality-v2.0.0.epub $ foliate Fundamental-Accessibility-Tests-Basic-Functionality-v2.0.0.epub 3. Install transmission and make sure it starts properly: $ sudo apt install transmission $ transmission-gtk 4. test bwrap profile is no longer enabled by default: - Install setzer and it will not open because the bwrap profile is not loaded: $ sudo apt install setzer $ setzer This is not a regression since it's the current behavior for 4.0.1really4.0.0-beta3-0ubuntu0.1 - Check if the following flatpak apps still work: $ sudo apt install flatpak $ sudo flatpak remote-add --if-not-exists flathub https://dl.flathub.org/repo/flathub.flatpakrepo $ sudo flatpak install flathub org.gnome.Recipes $ flatpak run --unshare=network org.gnome.Recipes $ sudo flatpak install org.keepassxc.KeePassXC $ flatpak run org.keepassxc.KeePassXC [ Where problems could occur ] There could still be more applications affected by the restriction of the creation of unpriviliged user namespaces. They might require the creation of new unconfined profiles which could be mitigated in a later SRU. [ Other Info ] The SRU is available in: https://launchpad.net/~georgiag/+archive/ubuntu/4.0.1really4.0.1-0ubuntu0.24.04.3 Note that the previous SRU was reverted because of the regression in Bug 2072811. This SRU has the same contents except for the enablement of the bwrap profile by default. The bwrap profile is available only under the apparmor-profiles package. The regression on the SRU version 4.0.1-0ubuntu0.24.04.2 happened because we don't have enough tests covering flatpak/bubblewrap. We created the profile to be as broad as possible for bwrap to work as expected but prevent applications running inside it to be able to bypass the unprivileged user namespace restriction. The profile worked for the applications we received reports for but unfortunately it wasn't as thorough, in terms of the variety of apps, as we would have liked. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2064672/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp