When this bug is fixed we should adjust the apparmor rules that were
added in bug #1462494 accordingly.

** Tags added: application-confinement

** Also affects: apparmor-easyprof-ubuntu (Ubuntu)
   Importance: Undecided
       Status: New

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
       Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1462492

Title:
  Untrusted Helpers using Trusted Prompt Sessions should be socket
  activated

Status in apparmor-easyprof-ubuntu package in Ubuntu:
  Confirmed
Status in ubuntu-app-launch package in Ubuntu:
  Confirmed

Bug description:
  Passing the Mir FD over DBus isn't ideal because it's a generic bus
  that is readable by more than the app itself. Instead there should be
  a direct socket connection made to pass the Mir Trusted Prompt Session
  FD that is unique to the untrusted helper that is being started.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1462492/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to