This bug was fixed in the package swtpm - 0.6.3-0ubuntu3.3
---
swtpm (0.6.3-0ubuntu3.3) jammy; urgency=medium
* d/usr.bin.swtpm:
- Add sys_admin capability to apparmor profile to allow access to kernel
modules such as tpm_vtpm_proxy (LP: #2071478)
- Allow non-owned loc
For the test plan execution I used 0.7.3-0ubuntu5.24.04.1 for noble, and
0.6.3-0ubuntu3.3 for jammy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072524
Title:
Allow non-owned lockfile writes in /v
The test plan execution from comment #6 doesn't clearly state the
version of the package that was used. Could you please clarify the
versions?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072524
Tit
This bug was fixed in the package swtpm - 0.7.3-0ubuntu5.24.04.1
---
swtpm (0.7.3-0ubuntu5.24.04.1) noble; urgency=medium
* d/usr.bin.swtpm:
- Add sys_admin capability to apparmor profile to allow access to kernel
modules such as tpm_vtpm_proxy (LP: #2071478)
- Allow n
Verified for noble and jammy:
Enabled proposed then created a windows 11 vm with virt-manager using the TPM
v2.0 addition.
Started the vm, then ran:
$ sudo swtpm socket --print-states --tpmstate
dir=/var/lib/libvirt/swtpm/aa5b37e8-6edf-4f2e-8550-7316cab991c6/tpm2,mode=0600
{ "type": "swtpm", "s
Hello Lena, or anyone else affected,
Accepted swtpm into jammy-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/swtpm/0.6.3-0ubuntu3.3
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
https://wiki.u
** Merge proposal linked:
https://code.launchpad.net/~lvoytek/ubuntu/+source/swtpm/+git/swtpm/+merge/470383
** Merge proposal linked:
https://code.launchpad.net/~lvoytek/ubuntu/+source/swtpm/+git/swtpm/+merge/470384
--
You received this bug notification because you are a member of Ubuntu
** Description changed:
+ [Impact]
+
+ The default apparmor profile for swtpm blocks access to libvirt TPM2
+ NVRAM state lockfiles. This causes denials for users who want to view
+ TPM states via swtpm's socket API.
+
+ The fix for this should be backported so print-states for libvirt TPM
+ wor
Removing mantic - eol
** Changed in: swtpm (Ubuntu Mantic)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072524
Title:
Allow non-owned lockfile writes in /v
This bug was fixed in the package swtpm - 0.7.3-0ubuntu7
---
swtpm (0.7.3-0ubuntu7) oracular; urgency=medium
* d/usr.bin.swtpm:
- Add sys_admin capability to apparmor profile to allow access to kernel
modules such as tpm_vtpm_proxy (LP: #2071478)
- Allow non-owned lock
** Changed in: swtpm (Ubuntu Jammy)
Status: New => In Progress
** Changed in: swtpm (Ubuntu Mantic)
Status: New => In Progress
** Changed in: swtpm (Ubuntu Noble)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Merge proposal linked:
https://code.launchpad.net/~lvoytek/ubuntu/+source/swtpm/+git/swtpm/+merge/468957
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072524
Title:
Allow non-owned lockfile
12 matches
Mail list logo