Bug#962838: Apparmor profile for syslog-ng assumes trivial config

2020-06-16 Thread intrigeri
Control: severity -1 minor Control: tag -1 + upstream Hi, Elliott Mitchell (2020-06-14): > [##.##] audit: type=1400 audit(): > apparmor="ALLOWED" operation="open" profile="syslog-ng" > name="/proc//cmdline" pid= comm="syslog-ng" > requested_mask="r" denied_mask="r"

Bug#962838: Apparmor profile for syslog-ng assumes trivial config

2020-06-14 Thread Elliott Mitchell
Package: apparmor-profiles Version: 2.13.2-10 I've added the option "use_dns(yes);" and am allowing messages from the local network. With this small configuration adjustment in place, I see the kernel log getting severely spammed by AppArmor: [##.##] audit: type=1400