Create a trusted socket for privileged processes
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Canonical System Image |
Fix Released
|
High
|
Unassigned | ||
apparmor-easyprof-ubuntu (Ubuntu) |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
apparmor-easyprof-ubuntu (Ubuntu RTM) |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
signon (Ubuntu) |
Fix Released
|
Undecided
|
Alberto Mardegan | ||
signon-apparmor-extension (Ubuntu) |
Fix Released
|
Undecided
|
Alberto Mardegan | ||
signon-apparmor-extension (Ubuntu RTM) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
We want to let privileged processes (such as those using the "unconfined" profile template) to access any online account without having the need of being added to the account's ACL.
signond and libsignon-qt already support connecting via a p2p D-Bus backed by a unix socket ("$XDG_
signon-
While apparmor policy already disallows access to this socket, apparmor-
Related branches
- PS Jenkins bot (community): Needs Fixing (continuous-integration)
- David Barth (community): Approve
-
Diff: 72 lines (+7/-24)2 files modifiedsrc/access-control-manager.cpp (+6/-21)
tests/tst_extension.cpp (+1/-3)
- Jamie Strandboge (community): Approve
- David Barth (community): Approve
-
Diff: 29 lines (+4/-4)2 files modifieddata/policygroups/ubuntu/1.0/accounts (+2/-2)
data/policygroups/ubuntu/1.2/accounts (+2/-2)
- Alberto Mardegan (community): Approve
-
Diff: 72 lines (+7/-24)2 files modifiedsrc/access-control-manager.cpp (+6/-21)
tests/tst_extension.cpp (+1/-3)
- Alberto Mardegan (community): Approve
-
Diff: 1057 lines (+539/-202)24 files modifieddebian/changelog (+17/-0)
debian/control (+1/-0)
debian/rules (+1/-0)
lib/plugins/SignOn/uisessiondata_priv.h (+2/-0)
src/signond/accesscontrolmanagerhelper.cpp (+1/-1)
src/signond/default-secrets-storage.cpp (+7/-4)
src/signond/default-secrets-storage.h (+1/-0)
src/signond/pluginproxy.cpp (+4/-0)
src/signond/signondaemon.cpp (+2/-0)
src/signond/signondaemonadaptor.cpp (+1/-1)
src/signond/signonidentity.cpp (+8/-30)
src/signond/signonidentityinfo.cpp (+12/-0)
src/signond/signonidentityinfo.h (+2/-0)
src/signond/signonsessioncore.cpp (+6/-2)
tests/libsignon-qt-tests/ssotestclient.cpp (+127/-161)
tests/libsignon-qt-tests/ssotestclient.h (+1/-1)
tests/libsignon-qt-tests/testauthsession.cpp (+1/-0)
tests/run-with-signond.sh (+5/-2)
tests/signond-tests/.gitignore (+1/-0)
tests/signond-tests/signond-tests.pri (+2/-0)
tests/signond-tests/signond-tests.pro (+2/-0)
tests/signond-tests/timeouts.cpp (+2/-0)
tests/signond-tests/tst_access_control_manager_helper.cpp (+320/-0)
tests/signond-tests/tst_access_control_manager_helper.pro (+13/-0)
description: | updated |
tags: | added: application-confinement |
Changed in signon-apparmor-extension (Ubuntu): | |
assignee: | nobody → Alberto Mardegan (mardy) |
Changed in signon (Ubuntu): | |
assignee: | nobody → Alberto Mardegan (mardy) |
status: | New → In Progress |
Changed in apparmor-easyprof-ubuntu (Ubuntu): | |
status: | New → Fix Committed |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in canonical-devices-system-image: | |
importance: | Undecided → High |
milestone: | none → ww07-2015 |
status: | New → In Progress |
Changed in canonical-devices-system-image: | |
status: | In Progress → Fix Released |
This bug was fixed in the package signon- apparmor- extension - 0.1+15. 04.20150203- 0ubuntu1
--------------- apparmor- extension (0.1+15. 04.20150203- 0ubuntu1) vivid; urgency=medium
signon-
[ CI bot ]
* Resync trunk
[ Alberto Mardegan ]
* Treat p2p clients as unconfined (LP: #1415492)
[ Ubuntu daily release ]
* New rebuild forced
-- Ubuntu daily release <email address hidden> Tue, 03 Feb 2015 13:10:00 +0000