Skip to content

Commit 45ab0a4

Browse files
committed
UBUNTU: Ubuntu-unstable-6.8.0-3.3
Signed-off-by: Paolo Pisati <[email protected]>
1 parent 85b3dd5 commit 45ab0a4

File tree

1 file changed

+178
-5
lines changed

1 file changed

+178
-5
lines changed

Diff for: debian.master/changelog

+178-5
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,183 @@
1-
linux-unstable (6.8.0-3.3) UNRELEASED; urgency=medium
1+
linux-unstable (6.8.0-3.3) noble; urgency=medium
22

3-
CHANGELOG: Do not edit directly. Autogenerated at release.
4-
CHANGELOG: Use the printchanges target to see the curent changes.
5-
CHANGELOG: Use the insertchanges target to create the final log.
3+
* noble/linux-unstable: 6.8.0-3.3 -proposed tracker (LP: #2051488)
64

7-
-- Paolo Pisati <[email protected]> Mon, 29 Jan 2024 08:57:05 +0100
5+
* update apparmor and LSM stacking patch set (LP: #2028253)
6+
- SAUCE: apparmor4.0.0 [43/87]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0
7+
[12/95]: add/use fns to print hash string hex value
8+
- SAUCE: apparmor4.0.0 [44/87]: patch to provide compatibility with v2.x net
9+
rules
10+
- SAUCE: apparmor4.0.0 [45/87]: add unpriviled user ns mediation
11+
- SAUCE: apparmor4.0.0 [46/87]: Add sysctls for additional controls of unpriv
12+
userns restrictions
13+
- SAUCE: apparmor4.0.0 [47/87]: af_unix mediation
14+
- SAUCE: apparmor4.0.0 [48/87]: Add fine grained mediation of posix mqueues
15+
- SAUCE: apparmor4.0.0 [49/87]: setup slab cache for audit data
16+
- SAUCE: apparmor4.0.0 [50/87]: Improve debug print infrastructure
17+
- SAUCE: apparmor4.0.0 [51/87]: add the ability for profiles to have a
18+
learning cache
19+
- SAUCE: apparmor4.0.0 [52/87]: enable userspace upcall for mediation
20+
- SAUCE: apparmor4.0.0 [53/87]: prompt - lock down prompt interface
21+
- SAUCE: apparmor4.0.0 [54/87]: prompt - allow controlling of caching of a
22+
prompt response
23+
- SAUCE: apparmor4.0.0 [55/87]: prompt - add refcount to audit_node in prep or
24+
reuse and delete
25+
- SAUCE: apparmor4.0.0 [56/87]: prompt - refactor to moving caching to
26+
uresponse
27+
- SAUCE: apparmor4.0.0 [57/87]: prompt - Improve debug statements
28+
- SAUCE: apparmor4.0.0 [58/87]: prompt - fix caching
29+
- SAUCE: apparmor4.0.0 [59/87]: prompt - rework build to use append fn, to
30+
simplify adding strings
31+
- SAUCE: apparmor4.0.0 [60/87]: prompt - refcount notifications
32+
- SAUCE: apparmor4.0.0 [61/87]: prompt - add the ability to reply with a
33+
profile name
34+
- SAUCE: apparmor4.0.0 [62/87]: prompt - fix notification cache when updating
35+
- SAUCE: apparmor4.0.0 [63/87]: prompt - add tailglob on name for cache
36+
support
37+
- SAUCE: apparmor4.0.0 [64/87]: prompt - allow profiles to set prompts as
38+
interruptible
39+
- SAUCE: apparmor4.0.0 [69/87]: add io_uring mediation
40+
- [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS
41+
42+
* apparmor restricts read access of user namespace mediation sysctls to root
43+
(LP: #2040194)
44+
- SAUCE: apparmor4.0.0 [73/87]: apparmor: open userns related sysctl so lxc
45+
can check if restriction are in place
46+
47+
* AppArmor spams kernel log with assert when auditing (LP: #2040192)
48+
- SAUCE: apparmor4.0.0 [72/87]: apparmor: fix request field from a prompt
49+
reply that denies all access
50+
51+
* apparmor notification files verification (LP: #2040250)
52+
- SAUCE: apparmor4.0.0 [71/87]: apparmor: fix notification header size
53+
54+
* apparmor oops when racing to retrieve a notification (LP: #2040245)
55+
- SAUCE: apparmor4.0.0 [70/87]: apparmor: fix oops when racing to retrieve
56+
notification
57+
58+
* update apparmor and LSM stacking patch set (LP: #2028253) // [FFe]
59+
apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic
60+
(LP: #2032602)
61+
- SAUCE: apparmor4.0.0 [66/87]: prompt - add support for advanced filtering of
62+
notifications
63+
- SAUCE: apparmor4.0.0 [67/87]: userns - add the ability to reference a global
64+
variable for a feature value
65+
- SAUCE: apparmor4.0.0 [68/87]: userns - make it so special unconfined
66+
profiles can mediate user namespaces
67+
68+
* Miscellaneous Ubuntu changes
69+
- SAUCE: apparmor4.0.0 [01/87]: LSM stacking v39: integrity: disassociate
70+
ima_filter_rule from security_audit_rule
71+
- SAUCE: apparmor4.0.0 [02/87]: LSM stacking v39: SM: Infrastructure
72+
management of the sock security
73+
- SAUCE: apparmor4.0.0 [03/87]: LSM stacking v39: LSM: Add the lsmblob data
74+
structure.
75+
- SAUCE: apparmor4.0.0 [04/87]: LSM stacking v39: IMA: avoid label collisions
76+
with stacked LSMs
77+
- SAUCE: apparmor4.0.0 [05/87]: LSM stacking v39: LSM: Use lsmblob in
78+
security_audit_rule_match
79+
- SAUCE: apparmor4.0.0 [06/87]: LSM stacking v39: LSM: Add lsmblob_to_secctx
80+
hook
81+
- SAUCE: apparmor4.0.0 [07/87]: LSM stacking v39: Audit: maintain an lsmblob
82+
in audit_context
83+
- SAUCE: apparmor4.0.0 [08/87]: LSM stacking v39: LSM: Use lsmblob in
84+
security_ipc_getsecid
85+
- SAUCE: apparmor4.0.0 [09/87]: LSM stacking v39: Audit: Update shutdown LSM
86+
data
87+
- SAUCE: apparmor4.0.0 [10/87]: LSM stacking v39: LSM: Use lsmblob in
88+
security_current_getsecid
89+
- SAUCE: apparmor4.0.0 [11/87]: LSM stacking v39: LSM: Use lsmblob in
90+
security_inode_getsecid
91+
- SAUCE: apparmor4.0.0 [12/87]: LSM stacking v39: Audit: use an lsmblob in
92+
audit_names
93+
- SAUCE: apparmor4.0.0 [13/87]: LSM stacking v39: LSM: Create new
94+
security_cred_getlsmblob LSM hook
95+
- SAUCE: apparmor4.0.0 [14/87]: LSM stacking v39: Audit: Change context data
96+
from secid to lsmblob
97+
- SAUCE: apparmor4.0.0 [15/87]: LSM stacking v39: Netlabel: Use lsmblob for
98+
audit data
99+
- SAUCE: apparmor4.0.0 [16/87]: LSM stacking v39: LSM: Ensure the correct LSM
100+
context releaser
101+
- SAUCE: apparmor4.0.0 [17/87]: LSM stacking v39: LSM: Use lsmcontext in
102+
security_secid_to_secctx
103+
- SAUCE: apparmor4.0.0 [18/87]: LSM stacking v39: LSM: Use lsmcontext in
104+
security_lsmblob_to_secctx
105+
- SAUCE: apparmor4.0.0 [19/87]: LSM stacking v39: LSM: Use lsmcontext in
106+
security_inode_getsecctx
107+
- SAUCE: apparmor4.0.0 [20/87]: LSM stacking v39: LSM: Use lsmcontext in
108+
security_dentry_init_security
109+
- SAUCE: apparmor4.0.0 [21/87]: LSM stacking v39: LSM:
110+
security_lsmblob_to_secctx module selection
111+
- SAUCE: apparmor4.0.0 [22/87]: LSM stacking v39: Audit: Create audit_stamp
112+
structure
113+
- SAUCE: apparmor4.0.0 [23/87]: LSM stacking v39: Audit: Allow multiple
114+
records in an audit_buffer
115+
- SAUCE: apparmor4.0.0 [24/87]: LSM stacking v39: Audit: Add record for
116+
multiple task security contexts
117+
- SAUCE: apparmor4.0.0 [25/87]: LSM stacking v39: audit: multiple subject lsm
118+
values for netlabel
119+
- SAUCE: apparmor4.0.0 [26/87]: LSM stacking v39: Audit: Add record for
120+
multiple object contexts
121+
- SAUCE: apparmor4.0.0 [27/87]: LSM stacking v39: LSM: Remove unused
122+
lsmcontext_init()
123+
- SAUCE: apparmor4.0.0 [28/87]: LSM stacking v39: LSM: Improve logic in
124+
security_getprocattr
125+
- SAUCE: apparmor4.0.0 [29/87]: LSM stacking v39: LSM: secctx provider check
126+
on release
127+
- SAUCE: apparmor4.0.0 [30/87]: LSM stacking v39: LSM: Single calls in
128+
socket_getpeersec hooks
129+
- SAUCE: apparmor4.0.0 [31/87]: LSM stacking v39: LSM: Exclusive secmark usage
130+
- SAUCE: apparmor4.0.0 [32/87]: LSM stacking v39: LSM: Identify which LSM
131+
handles the context string
132+
- SAUCE: apparmor4.0.0 [33/87]: LSM stacking v39: AppArmor: Remove the
133+
exclusive flag
134+
- SAUCE: apparmor4.0.0 [34/87]: LSM stacking v39: LSM: Add mount opts blob
135+
size tracking
136+
- SAUCE: apparmor4.0.0 [35/87]: LSM stacking v39: LSM: allocate mnt_opts blobs
137+
instead of module specific data
138+
- SAUCE: apparmor4.0.0 [36/87]: LSM stacking v39: LSM: Infrastructure
139+
management of the key security blob
140+
- SAUCE: apparmor4.0.0 [37/87]: LSM stacking v39: LSM: Infrastructure
141+
management of the mnt_opts security blob
142+
- SAUCE: apparmor4.0.0 [38/87]: LSM stacking v39: LSM: Correct handling of
143+
ENOSYS in inode_setxattr
144+
- SAUCE: apparmor4.0.0 [39/87]: LSM stacking v39: LSM: Remove lsmblob
145+
scaffolding
146+
- SAUCE: apparmor4.0.0 [40/87]: LSM stacking v39: LSM: Allow reservation of
147+
netlabel
148+
- SAUCE: apparmor4.0.0 [41/87]: LSM stacking v39: LSM: restrict
149+
security_cred_getsecid() to a single LSM
150+
- SAUCE: apparmor4.0.0 [42/87]: LSM stacking v39: Smack: Remove
151+
LSM_FLAG_EXCLUSIVE
152+
- SAUCE: apparmor4.0.0 [65/87] v6.8 prompt:fixup interruptible
153+
- SAUCE: apparmor4.0.0 [74/87]: apparmor: cleanup attachment perm lookup to
154+
use lookup_perms()
155+
- SAUCE: apparmor4.0.0 [75/87]: apparmor: remove redundant unconfined check.
156+
- SAUCE: apparmor4.0.0 [76/87]: apparmor: switch signal mediation to using
157+
RULE_MEDIATES
158+
- SAUCE: apparmor4.0.0 [77/87]: apparmor: ensure labels with more than one
159+
entry have correct flags
160+
- SAUCE: apparmor4.0.0 [78/87]: apparmor: remove explicit restriction that
161+
unconfined cannot use change_hat
162+
- SAUCE: apparmor4.0.0 [79/87]: apparmor: cleanup: refactor file_perm() to
163+
provide semantics of some checks
164+
- SAUCE: apparmor4.0.0 [80/87]: apparmor: carry mediation check on label
165+
- SAUCE: apparmor4.0.0 [81/87]: apparmor: convert easy uses of unconfined() to
166+
label_mediates()
167+
- SAUCE: apparmor4.0.0 [82/87]: apparmor: add additional flags to extended
168+
permission.
169+
- SAUCE: apparmor4.0.0 [83/87]: apparmor: add support for profiles to define
170+
the kill signal
171+
- SAUCE: apparmor4.0.0 [84/87]: apparmor: fix x_table_lookup when stacking is
172+
not the first entry
173+
- SAUCE: apparmor4.0.0 [85/87]: apparmor: allow profile to be transitioned
174+
when a user ns is created
175+
- SAUCE: apparmor4.0.0 [86/87]: apparmor: add ability to mediate caps with
176+
policy state machine
177+
- SAUCE: apparmor4.0.0 [87/87]: fixup notify
178+
- [Config] updateconfigs following v6.8-rc2 rebase
179+
180+
-- Paolo Pisati <[email protected]> Mon, 29 Jan 2024 08:59:32 +0100
8181

9182
linux-unstable (6.8.0-2.2) noble; urgency=medium
10183

0 commit comments

Comments
 (0)