This bug was fixed in the package apparmor - 4.0.0~alpha2-0ubuntu5
---------------
apparmor (4.0.0~alpha2-0ubuntu5) mantic; urgency=medium
* Add additional AppArmor profiles to support third-party applications
that use unprivileged user namespace restrictions (LP: #2036698)
- Refreshed d/p/u/userns-unconfined-profiles.patch to add additional
profiles and added to debian/apparmor.install
- usr.share.code.bin.code
- opt.microsoft.msedge.msedge
- usr.lib.multiarch.opera.opera
- opt.brave.com.brave.brave
- opt.vivaldi.vivaldi-bin
* Clarify comment in sysctl.d conf file that this feature is not
enabled by default but can be overridden by the user if desired.
-- Alex Murray <[email protected]> Fri, 22 Sep 2023 16:50:22
+0930
** Changed in: apparmor (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2036698
Title:
Unprivileged user namespace restrictions break various third-party
applications
Status in apparmor package in Ubuntu:
Fix Released
Bug description:
Similar to
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2035315 the
proposed unprivileged user namespace restrictions feature of apparmor
in mantic breaks various third-party applications that use
unprivileged userns for sandboxing themselves.
These include:
- Brave
- Microsoft Edge
- Opera
- Visual Studio Code
- Vivaldi
apparmor in mantic should ship skeleton profiles for each of these to
ensure they work as expected if a user has them installed.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2036698/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp