Jamie Strandboge <[EMAIL PROTECTED]> writes:
> Daniel, are you still seeing this on an up to date Hardy?
I am afraid so:
rc:0 ] dmesg |tail
[ 115.412073] audit(1208335452.188:18): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 115.412708] audit(1208335452.188:19): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 115.424999] audit(1208335452.200:20): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 115.425349] audit(1208335452.200:21): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.689623] audit(1208335453.513:22): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.689774] audit(1208335453.513:23): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.713254] audit(1208335453.537:24): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.720967] audit(1208335453.545:25): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.733223] audit(1208335453.557:26): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
[ 116.733394] audit(1208335453.557:27): type=1503 operation="inode_permission"
requested_mask="::r" denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6548
profile="/usr/sbin/avahi-daemon" namespace="default"
> /etc/localtime is allowed in the profile, and some changes were made to
> klibc and the kernel for improper matches.
rc:0 ] apt-cache show apparmor-profiles | grep Version
Version: 2.1+1075-0ubuntu9
Also, please note that the file is */etc/avahi*/etc/localtime, not the
global file, which is permitted.
Nothing in the avahi profile seems to match; perhaps it needs added:
/etc/avahi/etc/ r
(Though, that directory only contains the localtime file)
I believe this is used to chroot the avahi components nicely out of the
way of anything else in the name of security.
Regards,
Daniel
--
audit(1205449995.508:13): operation="inode_permission" request_mask="::r"
denied_mask="::r" name="/etc/avahi/etc/localtime" pid=6939
profile="/usr/sbin/avahi-daemon" namespace="default"
https://bugs.launchpad.net/bugs/202026
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs