When this bug is fixed we should adjust the apparmor rules that were added in bug #1462494 accordingly.
** Tags added: application-confinement ** Also affects: apparmor-easyprof-ubuntu (Ubuntu) Importance: Undecided Status: New ** Changed in: apparmor-easyprof-ubuntu (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu in Ubuntu. https://bugs.launchpad.net/bugs/1462492 Title: Untrusted Helpers using Trusted Prompt Sessions should be socket activated Status in apparmor-easyprof-ubuntu package in Ubuntu: Confirmed Status in ubuntu-app-launch package in Ubuntu: Confirmed Bug description: Passing the Mir FD over DBus isn't ideal because it's a generic bus that is readable by more than the app itself. Instead there should be a direct socket connection made to pass the Mir Trusted Prompt Session FD that is unique to the untrusted helper that is being started. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1462492/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp