This bug was fixed in the package apparmor - 4.0.0~alpha2-0ubuntu5 --------------- apparmor (4.0.0~alpha2-0ubuntu5) mantic; urgency=medium
* Add additional AppArmor profiles to support third-party applications that use unprivileged user namespace restrictions (LP: #2036698) - Refreshed d/p/u/userns-unconfined-profiles.patch to add additional profiles and added to debian/apparmor.install - usr.share.code.bin.code - opt.microsoft.msedge.msedge - usr.lib.multiarch.opera.opera - opt.brave.com.brave.brave - opt.vivaldi.vivaldi-bin * Clarify comment in sysctl.d conf file that this feature is not enabled by default but can be overridden by the user if desired. -- Alex Murray <alex.mur...@canonical.com> Fri, 22 Sep 2023 16:50:22 +0930 ** Changed in: apparmor (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor in Ubuntu. https://bugs.launchpad.net/bugs/2036698 Title: Unprivileged user namespace restrictions break various third-party applications Status in apparmor package in Ubuntu: Fix Released Bug description: Similar to https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2035315 the proposed unprivileged user namespace restrictions feature of apparmor in mantic breaks various third-party applications that use unprivileged userns for sandboxing themselves. These include: - Brave - Microsoft Edge - Opera - Visual Studio Code - Vivaldi apparmor in mantic should ship skeleton profiles for each of these to ensure they work as expected if a user has them installed. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2036698/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp