** Description changed:

  SRU Justification:
  
  [ Impact ]
  
  fusermount3 lacked permissions to mount to /cvmfs subdirectories,
  breaking usage of the CernVM FS.
  
  [ Test Plan ]
  
-  * The following instructions are adapted from 
https://cvmfs.readthedocs.io/en/stable/cpt-quickstart.html
-    - Install the cvmfs packages
-      + `wget 
https://cvmrepo.s3.cern.ch/cvmrepo/apt/cvmfs-release-latest_all.deb`
-      + `sudo dpkg -i cvmfs-release-latest_all.deb`
-      + `sudo apt-get -y update`
-      + `sudo apt-get -y install cvmfs`
-    - Set up autofs configs by running `sudo cvmfs_config setup` and `sudo 
systemctl restart autofs`
-    - Create `/etc/cvmfs/default.local` and add the lines 
"CVMFS_REPOSITORIES=cvmfs-config.cern.ch", "CVMFS_CLIENT_PROFILE=single" to it
-    - Attempt to mount by running `cvmfs_config probe`
-  * Without the fix:
-    - The mount step fails with a permission denial error
-    - AppArmor generates denial logs for fusermount3 denying the mount syscall
-  * With the fix: the mount should succeed with no AppArmor logs being 
generated
+  * Run `sudo aa-status` and verify that a fusermount3 profile is loaded
+  * The following instructions are adapted from 
https://cvmfs.readthedocs.io/en/stable/cpt-quickstart.html
+    - Install the cvmfs packages
+      + `wget 
https://cvmrepo.s3.cern.ch/cvmrepo/apt/cvmfs-release-latest_all.deb`
+      + `sudo dpkg -i cvmfs-release-latest_all.deb`
+      + `sudo apt-get -y update`
+      + `sudo apt-get -y install cvmfs`
+    - Set up autofs configs by running `sudo cvmfs_config setup` and `sudo 
systemctl restart autofs`
+    - Create `/etc/cvmfs/default.local` and add the lines 
"CVMFS_REPOSITORIES=cvmfs-config.cern.ch", "CVMFS_CLIENT_PROFILE=single" to it
+    - Attempt to mount by running `cvmfs_config probe`
+  * Without the fix:
+    - The mount step fails with a permission denial error
+    - AppArmor generates denial logs for fusermount3 denying the mount syscall
+  * With the fix: the mount should succeed with no AppArmor logs being 
generated
  
  [ Where problems could occur ]
  
  Adding a rule to allow mounting to /cvmfs subdirectories loosens
  confinement on a profile. However, if a user manually modified the
  installed profiles, then the package upgrade would cause conflicts, and
  rejection of the incoming changes (either by hand during an interactive
  upgrade or automatically during an batch unattended upgrade) would
  result in end users not getting the packaged fix.
  
  [ Other Info ]
  
  This bug was originally reported at
  https://gitlab.com/apparmor/apparmor/-/merge_requests/1587.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2110624

Title:
  apparmor fusermount3 profile blocks mounts to /cvmfs/ subdirectories

Status in apparmor package in Ubuntu:
  Fix Released
Status in apparmor source package in Plucky:
  In Progress
Status in apparmor source package in Questing:
  Fix Released

Bug description:
  SRU Justification:

  [ Impact ]

  fusermount3 lacked permissions to mount to /cvmfs subdirectories,
  breaking usage of the CernVM FS.

  [ Test Plan ]

   * Run `sudo aa-status` and verify that a fusermount3 profile is loaded
   * The following instructions are adapted from 
https://cvmfs.readthedocs.io/en/stable/cpt-quickstart.html
     - Install the cvmfs packages
       + `wget 
https://cvmrepo.s3.cern.ch/cvmrepo/apt/cvmfs-release-latest_all.deb`
       + `sudo dpkg -i cvmfs-release-latest_all.deb`
       + `sudo apt-get -y update`
       + `sudo apt-get -y install cvmfs`
     - Set up autofs configs by running `sudo cvmfs_config setup` and `sudo 
systemctl restart autofs`
     - Create `/etc/cvmfs/default.local` and add the lines 
"CVMFS_REPOSITORIES=cvmfs-config.cern.ch", "CVMFS_CLIENT_PROFILE=single" to it
     - Attempt to mount by running `cvmfs_config probe`
   * Without the fix:
     - The mount step fails with a permission denial error
     - AppArmor generates denial logs for fusermount3 denying the mount syscall
   * With the fix: the mount should succeed with no AppArmor logs being 
generated

  [ Where problems could occur ]

  Adding a rule to allow mounting to /cvmfs subdirectories loosens
  confinement on a profile. However, if a user manually modified the
  installed profiles, then the package upgrade would cause conflicts,
  and rejection of the incoming changes (either by hand during an
  interactive upgrade or automatically during an batch unattended
  upgrade) would result in end users not getting the packaged fix.

  [ Other Info ]

  This bug was originally reported at
  https://gitlab.com/apparmor/apparmor/-/merge_requests/1587.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2110624/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to