This bug was fixed in the package apparmor-easyprof-ubuntu - 1.3.4
---------------
apparmor-easyprof-ubuntu (1.3.4) vivid; urgency=medium
[ Alberto Mardegan ]
* ubuntu/accounts: explictly deny access to the p2p socket. This will now be
available only to unconfined apps to support a trusted socket for
privileged processes (LP: #1415492)
[ Jamie Strandboge ]
* add ubuntu/1.2/ubuntu-account-plugin template and add to 1.3 policy
(LP: #1219644)
* adjust expected_templates_12 in autopkgtests to have ubuntu-account-plugin
* ubuntu/webview: allow /sys/devices/system/cpu/*/cpufreq/cpuinfo_max_freq
readonly access
-- Jamie Strandboge <[email protected]> Tue, 03 Feb 2015 16:24:15 -0600
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219644
Title:
Account plugins should be made confinable by apparmor
To manage notifications about this bug go to:
https://bugs.launchpad.net/click-reviewers-tools/+bug/1219644/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs