AppArmor 2.13.4

Milestone information

Project:
AppArmor
Series:
2.13
Version:
2.13.4
Released:
 
Registrant:
John Johansen
Release registered:
Active:
No. Drivers cannot target bugs and blueprints to this milestone.  

Download RDF metadata

Activities

Assigned to you:
No blueprints or bugs assigned to you.
Assignees:
No users assigned to blueprints and bugs.
Blueprints:
No blueprints are targeted to this milestone.
Bugs:
No bugs are targeted to this milestone.

Download files for this release

After you've downloaded a file, you can verify its authenticity using its MD5 sum or signature. (How do I verify a download?)

File Description Downloads
download icon apparmor-2.13.4.tar.gz (md5, sig) AppArmor 2.13.4 3,051
last downloaded 3 weeks ago
Total downloads: 3,051

Release notes 

Introduction
AppArmor 2.13.4 is a maintenance release of the user space components
of the AppArmor security project. The kernel portion of the project
is maintained and pushed separately.
This version of the userspace should work with all kernel versions from
2.6.15 and later (some earlier version of the kernel if they have the
apparmor patches applied). And supports features released in the 4.18
kernel and ubuntu 18.04 kernel with the apparmor 3 development patches.
AppArmor 2.13.4 was released 2020-03-12.

Obtaining the Release
These release notes cover all changes between 2.13.3 (2f9d9ea7) and 2.13.4 (XXXXX) on the apparmor-2.13 branch.
Tarball

https://launchpad.net/apparmor/2.13/2.13.4/+download/apparmor-2.13.4.tar.gz
sha256sum:
signature: https://launchpad.net/apparmor/2.13/2.13.4/+download/apparmor-2.13.4.tar.gz.asc

Changes in this Release

Build Infrastructure

Enable continuous integration testing on the 2.13 branch ([MR436])
Fix autoconf check for Python 3.8 ([MR430])
Fix vim syntax highlighting for capability ([MR421])
Fix cross compile by allowing overriding of ar ([issue41])
Allow installing apparmor_parser to a custom sbin location ([MR111])

libapparmor

Fix log parsing for logs with an embedded newline ([MR395])

Policy Compiler (a.k.a apparmor_parser)

Fix typo in usage message ([MR406])

Utils

aa-status

handle profile names containing '(' ([MR415])

genprof/logprof

Fix crash due to local includes ([lp1848227], [MR427])
Fix crash when log message contains a filename with unbalanced parenthesis ([MR406])

Policy

Abstractions

authentication

add support for /usr/etc used by some RO root images ([boo1153162], [MR426])

base

allow access to /run/uuidd/request ([MR445])
allow access to top level ecryptfs directories ([LP1848919], [MR443])
allow reading per-user themes from $XDG_DATA_HOME ([MR442])

fonts

don't allow writing to fontconfig cache ([MR420])

gnome

allow access to xdg mimeapps.list ([LP1792027], [MR444])

kerberosclient

allow reading /etc/krb5.conf.d/ ([MR425])

ssl_certs/ssl_keys

add support for cert bot ([MR397])

X

allow reading the Xauth file that mutter passes to Xwayland ([dbug935058], [MR419])

Tests

Fix mult_mount test for cases where the block size is greater than 1K ([LP1834192], [MR396])

Documentation

apparmor.d (7)

fix typos in documentation for dbus and unix rules ([LP1838991], [MR410])

README.md

Document how to use PYFLAKES during testing ([MR429])

Note
There is a semantic change in the 4.8 kernel (commit
9f834ec18defc369d73ccf9e87a2790bfa05bf46) that affects apparmor policy
enforcement. Specifically it affects when the m permission bit is
checked for elf binary executables. Policy and tests within apparmor
2.12 and later have been updated to support running on pre 4.8 and 4.8+ kernels.

Changelog 

This release does not have a changelog.

0 blueprints and 0 bugs targeted

There are no feature specifications or bug tasks targeted to this milestone. The project's maintainer, driver, or bug supervisor can target specifications and bug tasks to this milestone to track the things that are expected to be completed for the release.

This milestone contains Public information
Everyone can see this information.