[SRU] AppArmor on Hardy Interferes with glibc Access to /proc/self/maps
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
apparmor (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Low
|
Unassigned |
Bug Description
Binary package hint: apparmor
Impact: Lack of a single AppArmor base profile rule renders glibc unable to perform functions on Hardy that are available on Lucid.
Addressed: apparmor 2.5-0ubuntu3 (on Lucid) possibly earlier too.
Patch: https:/
Reproducing: trapping a segfault fails; see http://
Regression potential: none known
Attempt to catch a SIGSEGV inside OpenLDAP on Hardy results in an AppArmor error message instead:
2010-09-
audit(
denied_mask="::r" name="/
namespace=
ProblemType: Bug
Architecture: amd64
Date: Fri Oct 29 14:48:20 2010
DistroRelease: Ubuntu 8.04
Package: apparmor 2.1+1075-0ubuntu9.2
PackageArchitec
ProcEnviron:
PATH=/
LANG=en_US.UTF-8
SHELL=/bin/bash
SourcePackage: apparmor
Uname: Linux 2.6.24-28-generic x86_64
Related branches
description: | updated |
summary: |
- AppArmor on Hardy Interferes with glibc Access to /proc/self/maps + [SRU] AppArmor on Hardy Interferes with glibc Access to /proc/self/maps |
tags: |
added: verification-done removed: verification-needed |
debdiff with the missing AppArmor base profile rule added.