AppArmor 3.0.5 fixes a build error in AppArmor 3.0.4 that could cause AppArmor builds to fail during tests in some build environments. It is a maintenance release of the user space components of the AppArmor security project. The kernel portion of the project is maintained and pushed separately.

This version of the userspace should work with all kernel versions from 2.6.15 and later (some earlier version of the kernel if they have the apparmor patches applied).

The kernel portion of the project is maintained and pushed separately.

Obtaining the Release

There are two ways to obtain this release either through gitlab or a tarball in launchpad.

Important note: the gitlab release tarballs differ from the launchpad release tarballs. The launchpad release tarball has a couple processing steps already performed:

  • libapparmor autogen.sh is already done, meaning distros only need to use ./configure in their build setup
  • the docs for everything but libapparmor have already been built

gitlab

Launchpad

Changes in this Release

These release notes cover all changes between 3.0.4 (939530b2b89ee26bef52ccfe3d271629f4da097d) and 3.0.5 (704c82c57414bcbf7d7b698605887fb515e5b427) apparmor-3.0 branch.

Init

Library

Policy Compiler (a.k.a apparmor_parser)

  • fix min length calculation for inverse character sets (MR:872)
  • fix missing include dependency (MR:882)
  • fix building with link time optimization (lto) (MR:851, AABUG:214)

Utils

  • aa-remove-unknown: abort on parser failure (MR:859)
  • aa-notify
    • Add .desktop file for aa-notify (MR:839)
    • Drop superfluous shebang from python module (MR:846)
    • Fix inconsistent return length in _run_tests() (MR:891)

Policy

abstractions

  • apache2-common
    • allow other processes to trace the hats that include the abstraction (MR:852, debug1003153)
  • gtk
    • add support for gtk4. (MR:857)
  • ibus
    • Allow access to socket directory used by recent ibus-daemon (MR:837)
  • mesa
    • fix device query access (MR:879)
  • nss-systemd
  • php
  • samba
    • quiet noise setsockopt calls (MR:867)
  • snap_browsers
    • add permissions required due to updates on snaps (MR:877)
  • ssh_certs
    • extend pki/trust directories (MR:864)

profiles

  • dovecot
  • samba
    • support paths used by Arch Linux (MR:883)
    • add missing mmaps for aarch64 (MR:880, BOO:1198309)
    • add profiles to support samba-4.16 new dcerpc subsystem (MR:871)
    • Fix read access denied on /proc/*/fd (MR:860)
    • allow reading openssl.cnf (MR:862, BOO:1195463)
    • allow reading under /usr/share/samba (MR:853)
    • include snippet generated at runtime on Debian and openSUSE (MR:838)
    • support paths used by Arch Linux (MR:883)
  • statd
    • add missing config and hosts_access (MR:866)
  • syslogd
    • update to support inetutils-syslogd (MR:888)

Tests

  • parser - error out on unexpected success (MR:868)
  • make test-aa-notify test_help_contents () less strict (MR:848, AABUG:220, AABUG:220)
  • python tests - Support setuptools >= 61.2 in Python (MR:899, HUBMR:3258/commits/1c23f5e1e4b18b50081cbabb2dea22bf345f5894)

Additional Note

There is a semantic change in the 4.8 kernel (commit 9f834ec18defc369d73ccf9e87a2790bfa05bf46) that affects apparmor policy enforcement. Specifically it affects when the m permission bit is checked for elf binary executables. Policy and tests within apparmor 2.12 and later have been updated to support running on pre 4.8 and 4.8+ kernels.