This bug was fixed in the package signon -
8.57+15.04.20150204.1-0ubuntu1

---------------
signon (8.57+15.04.20150204.1-0ubuntu1) vivid; urgency=medium

  [ Alberto Mardegan ]
  * Enable P2P D-Bus connections (LP: #1415492)
  * Add missing build dependency on libdbus-1-dev
 -- Ubuntu daily release <ps-jenk...@lists.canonical.com>   Wed, 04 Feb 2015 
10:39:42 +0000

** Changed in: signon (Ubuntu)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to signon in Ubuntu.
https://bugs.launchpad.net/bugs/1415492

Title:
  Create a trusted socket for privileged processes

Status in apparmor-easyprof-ubuntu package in Ubuntu:
  Fix Committed
Status in signon package in Ubuntu:
  Fix Released
Status in signon-apparmor-extension package in Ubuntu:
  Fix Released

Bug description:
  We want to let privileged processes (such as those using the
  "unconfined" profile template) to access any online account without
  having the need of being added to the account's ACL.

  signond and libsignon-qt already support connecting via a p2p D-Bus
  backed by a unix socket ("$XDG_RUNTIME_DIR/signond/socket"), but it's
  currently switched off at build time. We should enable it.

  signon-apparmor-extension has to be changed so that a peer connected
  via the p2p D-Bus connection will always be treated as "unconfined".

  While apparmor policy already disallows access to this socket,
  apparmor-easyprof-ubuntu needs to be modified so that the "accounts"
  policy will contain an explicity deny rule for
  "$XDG_RUNTIME_DIR/signond/socket" to suppress logging the denial.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1415492/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to