Bug: https://bugs.launchpad.net/bugs/1375516

The unix_socket test program calls getsockopt() after calling bind().
Because AppArmor continues to use traditional file rules for sockets
bound to a filesystem path, it does not mediate some socket operations
after the socket has been bound to the filesystem path. The getopt
permission is one of those socket operations.

To account for this lack of mediation, the getopt permission should be
removed from the server permissions list.

Signed-off-by: Tyler Hicks <tyhi...@canonical.com>
---
 tests/regression/apparmor/unix_socket_pathname.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/regression/apparmor/unix_socket_pathname.sh 
b/tests/regression/apparmor/unix_socket_pathname.sh
index 344c86d..2fefcc9 100755
--- a/tests/regression/apparmor/unix_socket_pathname.sh
+++ b/tests/regression/apparmor/unix_socket_pathname.sh
@@ -53,7 +53,7 @@ fi
 af_unix_okserver=
 af_unix_okclient=
 if [ "$(have_features network/af_unix)" == "true" ] ; then
-       af_unix_okserver="create,getopt,setopt"
+       af_unix_okserver="create,setopt"
        af_unix_okclient="create,getopt,setopt,getattr"
 fi
 
-- 
2.1.0


-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor

Reply via email to