apparmor (2.10.95-0ubuntu2.1) xenial; urgency=medium

  * debian/patches/r3460-ignore-file-events-with-send-or-receive-request.patch:
    Prevent an aa-logprof crash by ignoring file events that contains
    send or receive in the request mask. (LP: #1577051, LP: #1582374)
  * debian/patches/r3463-r3475-change-profile-exec-modes.patch: Allow policy
    authors to specify if the environment should scrubbed during exec
    transitions allowed by a change_profile rule. (LP: #1584069)
  * debian/patches/r3478-make-overlapping-safe-and-unsafe-rules-conflict.patch:
    Make sure that multiple change_profile rules with overlapping safe and
    unsafe exec modes conflict when they share the same exec conditional
    (LP: #1588069)
  * debian/patches/r3488-r3489-fix-racy-onexec-test.patch: Fix racy regression
    test so that the kernel SRU process is not interrupted by the onexec.sh
    periodically failing. (LP: #1528230)
  * debian/patches/r3490-utils-handle-change-profile-exec-modes.patch: Update
    the Python utilities to handle the new exec mode keywords in
    change_profile rules. (LP: #1584069)
  * debian/patches/r3492-allow-dbus-user-session-path.patch: Allow read/write
    access to the dbus-user-session socket file in profiles that include the
    dbus-session-strict abstraction. (LP: #1604872)

Date: Thu, 28 Jul 2016 11:02:11 -0500
Changed-By: Tyler Hicks <tyhi...@canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/apparmor/2.10.95-0ubuntu2.1
Format: 1.8
Date: Thu, 28 Jul 2016 11:02:11 -0500
Source: apparmor
Binary: apparmor apparmor-utils apparmor-profiles apparmor-docs libapparmor-dev 
libapparmor1 libapparmor-perl libapache2-mod-apparmor libpam-apparmor 
apparmor-notify python-libapparmor python3-libapparmor python-apparmor 
python3-apparmor dh-apparmor apparmor-easyprof
Architecture: source
Version: 2.10.95-0ubuntu2.1
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Tyler Hicks <tyhi...@canonical.com>
Description:
 apparmor   - user-space parser utility for AppArmor
 apparmor-docs - documentation for AppArmor
 apparmor-easyprof - AppArmor easyprof profiling tool
 apparmor-notify - AppArmor notification system
 apparmor-profiles - profiles for AppArmor Security policies
 apparmor-utils - utilities for controlling AppArmor
 dh-apparmor - AppArmor debhelper routines
 libapache2-mod-apparmor - changehat AppArmor library as an Apache module
 libapparmor-dev - AppArmor development libraries and header files
 libapparmor-perl - AppArmor library Perl bindings
 libapparmor1 - changehat AppArmor library
 libpam-apparmor - changehat AppArmor library as a PAM module
 python-apparmor - AppArmor Python utility library
 python-libapparmor - AppArmor library Python bindings
 python3-apparmor - AppArmor Python3 utility library
 python3-libapparmor - AppArmor library Python3 bindings
Launchpad-Bugs-Fixed: 1528230 1577051 1582374 1584069 1588069 1604872
Changes:
 apparmor (2.10.95-0ubuntu2.1) xenial; urgency=medium
 .
   * debian/patches/r3460-ignore-file-events-with-send-or-receive-request.patch:
     Prevent an aa-logprof crash by ignoring file events that contains
     send or receive in the request mask. (LP: #1577051, LP: #1582374)
   * debian/patches/r3463-r3475-change-profile-exec-modes.patch: Allow policy
     authors to specify if the environment should scrubbed during exec
     transitions allowed by a change_profile rule. (LP: #1584069)
   * debian/patches/r3478-make-overlapping-safe-and-unsafe-rules-conflict.patch:
     Make sure that multiple change_profile rules with overlapping safe and
     unsafe exec modes conflict when they share the same exec conditional
     (LP: #1588069)
   * debian/patches/r3488-r3489-fix-racy-onexec-test.patch: Fix racy regression
     test so that the kernel SRU process is not interrupted by the onexec.sh
     periodically failing. (LP: #1528230)
   * debian/patches/r3490-utils-handle-change-profile-exec-modes.patch: Update
     the Python utilities to handle the new exec mode keywords in
     change_profile rules. (LP: #1584069)
   * debian/patches/r3492-allow-dbus-user-session-path.patch: Allow read/write
     access to the dbus-user-session socket file in profiles that include the
     dbus-session-strict abstraction. (LP: #1604872)
Checksums-Sha1:
 369124da65b4312169ef6c615ed3ce2529ff50a5 3252 apparmor_2.10.95-0ubuntu2.1.dsc
 b765863b534b00f1ac26be2a5a76ff258a3ace62 91184 
apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Checksums-Sha256:
 ac70713360c918a122dde86df65b168b7bbe562c9ecf9b2de506d1adde83531d 3252 
apparmor_2.10.95-0ubuntu2.1.dsc
 ac48a8ca27557d7a9948fe0aef201182505c3d8dc6aba00864e3bb25e97df373 91184 
apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Files:
 7988cfbf45f6ba0ae48a65f3c20318ae 3252 admin extra 
apparmor_2.10.95-0ubuntu2.1.dsc
 1aabbed2bb36f6ebb0f4add15d91f094 91184 admin extra 
apparmor_2.10.95-0ubuntu2.1.debian.tar.xz
Original-Maintainer: Debian AppArmor Team 
<pkg-apparmor-t...@lists.alioth.debian.org>
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to