First of all, Trusty kernel worked somehow differently. It didn't
complain for /dev/log.
Yes, my /etc/apparmor.d/usr.sbin.rsyslogd does not have 'r' for /dev/log:
/dev/log wl,
So does it mean that the rsyslog profile has to be patched for trusty?
Or at least some kind of
John,
I'm using Ubuntu Trusty with Utopic HWE, so my apparmor is from Trusty.
I didn't install anything from backports or Utopic by hand to not mess package
system and LTS state of distribution.
But somehow the system does not behave like trusty.
Note that I've updated this system from 12.04 w/
It seems that issue is gone with this fix.
1. Installed the package from trusty-proposed
# LANG=C apt-cache policy rsyslog
rsyslog:
Installed: 7.4.4-1ubuntu2.6
Candidate: 7.4.4-1ubuntu2.6
Version table:
*** 7.4.4-1ubuntu2.6 0
400 http://archive.ubuntu.com/ubuntu/
Also if you read comments of other Ubuntu _developers_, they are rather
confident that the bug is in Utopic HWE for Trusty
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
As I said before, I don't use Vivid, I use Trusty which is stated to be
supported until 2019!
The bug is against trusty, please don't close it as fixed in an non-LTS
release
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Also affects: rsyslog (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsyslog in Ubuntu.
https://bugs.launchpad.net/bugs/1373070
Title:
full fix for disconnected path
I'm affected by this bug too at Trusty + Vivid HWE
# lsb_release -rd
Description:Ubuntu 14.04.3 LTS
Release:14.04
# uname -a
Linux amanda 3.19.0-42-generic #48~14.04.1-Ubuntu SMP Fri Dec 18 10:25:23 UTC
2015 i686 i686 i686 GNU/Linux
# dpkg -l | grep linux-image-generic
ii
Same here. Just upgraded from 14.04.5 to 16.04.1
Apparmor forbids avahi to create datagram socket, so it dies with an assertion:
$ journalctl -ab0 | grep avahi
авг 30 11:51:46 amanda audit[2230]: AVC apparmor="STATUS"
operation="profile_load" profile="unconfined" name="/usr/sbin/avahi-daemon"
Hi. I believe my Ubuntu systems just received this patch and I believe it
failed to install:
Can't exec "/tmp/openssh-server.config.neW0Pf": Permission denied at
/usr/share/perl/5.26/IPC/Open3.pm line 178.
open2: exec of /tmp/openssh-server.config.neW0Pf configure 1:7.6p1-4ubuntu0.3
Happens on 20.04. Eventually swap is 100% full and machine is rebooted
by watchdog due to high (>240) load average.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1273258
Confirming the clevis issue.
Patch for reference:
--- /usr/share/initramfs-tools/scripts/local-bottom/clevis.orig 2022-07-11
10:52:16.938228467 -0500
+++ /usr/share/initramfs-tools/scripts/local-bottom/clevis 2022-07-11
10:30:08.040636353 -0500
@@ -46,5 +46,9 @@ for iface in
11 matches
Mail list logo