Jamie, thanks for the owner restriction, that makes sense indeed! I committed that to bzr.
As for "/sys rm" I'm not really concerned. sysfs is mostly public information (the ones that aren't, like serial numbers, are already readable for root only). I'm not actually sure whether I made /tmp/ executable as reaction to a bug fix (nothing in bzr history, though) or just because you can already run arbitrary code through shell, python, and other scripts. The main point of the profile is to enforce the inaccessibility of any other user's data, but you should still be able to run programs normally. That's also the reason why I enforce inheritance for all /bin, including for programs that already have their own profile (as the guest session's is usually a lot stricter). Do you see some attack scenarios where it would be better to use the program's profiles? Thanks, Martin -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/673034 Title: gdm-guest-session AppArmor profile improvements -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs