Skip to content
Snippets Groups Projects
  1. Apr 02, 2020
  2. Apr 01, 2020
    • Rich McAllister's avatar
      abstractions: add /etc/mdns.allow to /etc/apparmor.d/abstractions/mdns · dda6825f
      Rich McAllister authored
      In focal users of mdns get denials in apparmor confined applications.
      An exampel can be found in the original bug below.
      
      It seems it is a common pattern, see
      https://github.com/lathiat/nss-mdns#etcmdnsallow
      
      Therefore I'm asking to add
         /etc/mdns.allow r,
      to the file
         /etc/apparmor.d/abstractions/mdns"
      by default.
      
      --- original bug ---
      
      Many repetitions of
      
      audit: type=1400 audit(1585517168.705:63): apparmor="DENIED" operation="open" profile="/usr/sbin/chronyd" name="/etc/mdns.allow" pid=1983815 comm="chronyd" requested_mask="r" denied_mask="r" fsuid=123 ouid=0
      
      in log. I use libnss-mdns for .local name resolution, so /etc/nsswitch.conf contains
      
      hosts: files mdns [NOTFOUND=return] myhostname dns
      
      and /etc/mnds.allow contains the domains to resolve with mDNS (in may case, "local." and "local"; see /usr/share/doc/libnss-mdns/README.html.)
      
      Presumably cronyd calls a gethostbyX() somewhere, thus eventually trickling down through the name service switch and opening /etc/mdns.allow, which the AppArmor profile in the chrony package does not allow.
      
      Fixes: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1869629
      
      
      Signed-off-by: default avatarJohn Johansen <john.johansen@canonical.com>
      
      (cherry picked from commit eeac8c11)
      dda6825f
  3. Mar 31, 2020
  4. Mar 23, 2020
  5. Mar 17, 2020
  6. Mar 12, 2020
  7. Feb 03, 2020
  8. Feb 01, 2020
  9. Dec 17, 2019
  10. Nov 27, 2019
  11. Nov 18, 2019
  12. Oct 24, 2019
  13. Sep 23, 2019
  14. Sep 20, 2019
  15. Sep 16, 2019
  16. Aug 05, 2019
  17. Aug 01, 2019
  18. Jul 09, 2019
  19. Jul 08, 2019
  20. Jul 02, 2019
    • John Johansen's avatar
      libapparmor: logparse: fix RECORD_INVALID for valid log · ed9ccbdd
      John Johansen authored
      v2:
      - parse partial log line broken at \n
      - add testcase_dbus_10.* for partial log line
      - remove quotes from  testcasw_dbus_09.profile
      
      The following log format has been seen in the wild, and currently results
      in a RECORD_INVALID
      
          [4835959.046111] audit: type=1107 audit(1561053426.749:186): pid=640 uid=103 auid=4294967295 ses=4294967295 msg='apparmor="ALLOWED" operation="dbus_method_call"  bus="system" path="/org/freedesktop/systemd1" interface="org.freedesktop.systemd1.Manager" member="LookupDynamicUserByName" mask="send" name="org.freedesktop.systemd1" pid=20596 label="/usr/sbin/sshd" peer_pid=1 peer_label="unconfined"
                            exe="/usr/bin/dbus-daemon" sauid=103 hostname=? addr=? terminal=?'
      
      Test parsing the above message with and without the \n embedded between
      peer_label= and exec=
      
      PR: apparmor/apparmor!395
      
      
      Acked-by: default avatarSeth Arnold <seth.arnold@canonical.com>
      Signed-off-by: default avatarJohn Johansen <john.johansen@canonical.com>
      (cherry picked from commit 0349cf2d)
      ed9ccbdd
  21. Jun 30, 2019
  22. Jun 29, 2019
  23. Jun 27, 2019
  24. Jun 26, 2019
  25. Jun 20, 2019
Loading