add Depends: apparmor-profile-anondist to fix apparmor issue

sudo[19806]: pam_exec(sudo:session): execve(/usr/lib/security-misc/permission-lockdown,...) failed: Permission denied
sudo[18961]: pam_exec(sudo:session): /usr/lib/security-misc/permission-lockdown failed: exit code 13
kernel: audit: type=1400 audit(1565780860.972:224): apparmor="DENIED" operation="exec" profile="/usr/bin/whonixcheck" name="/usr/lib/security-misc/permission-lockdown" pid=19806 comm="sudo" requested_mask="x" denied_mask="x" fsuid=0 ouid=0
This commit is contained in:
Patrick Schleizer 2019-08-14 11:10:18 +00:00
parent 8fdc77fed5
commit 0feb54b28e
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48

2
debian/control vendored
View File

@ -14,7 +14,7 @@ Standards-Version: 4.3.0
Package: security-misc
Architecture: all
Depends: python, libglib2.0-bin, libpam-runtime, libpam-cgfs, sudo,
${misc:Depends}
apparmor-profile-anondist, ${misc:Depends}
Replaces: tcp-timestamps-disable
Description: enhances misc security settings
kernel hardening: