* d/usr.bin.swtpm:
- Add sys_admin capability to apparmor profile to allow access to kernel
modules such as tpm_vtpm_proxy (LP: #2071478)
- Allow non-owned lockfile write access in /var/lib/libvirt/swtpm/ to fix
apparmor denials when working with TPM2 locks (LP: #2072524)
This bug was fixed in the package swtpm - 0.7.3-0ubuntu7
---------------
swtpm (0.7.3-0ubuntu7) oracular; urgency=medium
* d/usr.bin.swtpm: libvirt/ swtpm/ to fix
- Add sys_admin capability to apparmor profile to allow access to kernel
modules such as tpm_vtpm_proxy (LP: #2071478)
- Allow non-owned lockfile write access in /var/lib/
apparmor denials when working with TPM2 locks (LP: #2072524)
-- Lena Voytek <email address hidden> Tue, 09 Jul 2024 06:06:00 -0700