|
1 |
| -linux-unstable (6.8.0-3.3) UNRELEASED; urgency=medium |
| 1 | +linux-unstable (6.8.0-3.3) noble; urgency=medium |
2 | 2 |
|
3 |
| - CHANGELOG: Do not edit directly. Autogenerated at release. |
4 |
| - CHANGELOG: Use the printchanges target to see the curent changes. |
5 |
| - CHANGELOG: Use the insertchanges target to create the final log. |
| 3 | + * noble/linux-unstable: 6.8.0-3.3 -proposed tracker (LP: #2051488) |
6 | 4 |
|
7 |
| - -- Paolo Pisati < [email protected]> Mon, 29 Jan 2024 08:57:05 +0100 |
| 5 | + * update apparmor and LSM stacking patch set (LP: #2028253) |
| 6 | + - SAUCE: apparmor4.0.0 [43/87]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0 |
| 7 | + [12/95]: add/use fns to print hash string hex value |
| 8 | + - SAUCE: apparmor4.0.0 [44/87]: patch to provide compatibility with v2.x net |
| 9 | + rules |
| 10 | + - SAUCE: apparmor4.0.0 [45/87]: add unpriviled user ns mediation |
| 11 | + - SAUCE: apparmor4.0.0 [46/87]: Add sysctls for additional controls of unpriv |
| 12 | + userns restrictions |
| 13 | + - SAUCE: apparmor4.0.0 [47/87]: af_unix mediation |
| 14 | + - SAUCE: apparmor4.0.0 [48/87]: Add fine grained mediation of posix mqueues |
| 15 | + - SAUCE: apparmor4.0.0 [49/87]: setup slab cache for audit data |
| 16 | + - SAUCE: apparmor4.0.0 [50/87]: Improve debug print infrastructure |
| 17 | + - SAUCE: apparmor4.0.0 [51/87]: add the ability for profiles to have a |
| 18 | + learning cache |
| 19 | + - SAUCE: apparmor4.0.0 [52/87]: enable userspace upcall for mediation |
| 20 | + - SAUCE: apparmor4.0.0 [53/87]: prompt - lock down prompt interface |
| 21 | + - SAUCE: apparmor4.0.0 [54/87]: prompt - allow controlling of caching of a |
| 22 | + prompt response |
| 23 | + - SAUCE: apparmor4.0.0 [55/87]: prompt - add refcount to audit_node in prep or |
| 24 | + reuse and delete |
| 25 | + - SAUCE: apparmor4.0.0 [56/87]: prompt - refactor to moving caching to |
| 26 | + uresponse |
| 27 | + - SAUCE: apparmor4.0.0 [57/87]: prompt - Improve debug statements |
| 28 | + - SAUCE: apparmor4.0.0 [58/87]: prompt - fix caching |
| 29 | + - SAUCE: apparmor4.0.0 [59/87]: prompt - rework build to use append fn, to |
| 30 | + simplify adding strings |
| 31 | + - SAUCE: apparmor4.0.0 [60/87]: prompt - refcount notifications |
| 32 | + - SAUCE: apparmor4.0.0 [61/87]: prompt - add the ability to reply with a |
| 33 | + profile name |
| 34 | + - SAUCE: apparmor4.0.0 [62/87]: prompt - fix notification cache when updating |
| 35 | + - SAUCE: apparmor4.0.0 [63/87]: prompt - add tailglob on name for cache |
| 36 | + support |
| 37 | + - SAUCE: apparmor4.0.0 [64/87]: prompt - allow profiles to set prompts as |
| 38 | + interruptible |
| 39 | + - SAUCE: apparmor4.0.0 [69/87]: add io_uring mediation |
| 40 | + - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS |
| 41 | + |
| 42 | + * apparmor restricts read access of user namespace mediation sysctls to root |
| 43 | + (LP: #2040194) |
| 44 | + - SAUCE: apparmor4.0.0 [73/87]: apparmor: open userns related sysctl so lxc |
| 45 | + can check if restriction are in place |
| 46 | + |
| 47 | + * AppArmor spams kernel log with assert when auditing (LP: #2040192) |
| 48 | + - SAUCE: apparmor4.0.0 [72/87]: apparmor: fix request field from a prompt |
| 49 | + reply that denies all access |
| 50 | + |
| 51 | + * apparmor notification files verification (LP: #2040250) |
| 52 | + - SAUCE: apparmor4.0.0 [71/87]: apparmor: fix notification header size |
| 53 | + |
| 54 | + * apparmor oops when racing to retrieve a notification (LP: #2040245) |
| 55 | + - SAUCE: apparmor4.0.0 [70/87]: apparmor: fix oops when racing to retrieve |
| 56 | + notification |
| 57 | + |
| 58 | + * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe] |
| 59 | + apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic |
| 60 | + (LP: #2032602) |
| 61 | + - SAUCE: apparmor4.0.0 [66/87]: prompt - add support for advanced filtering of |
| 62 | + notifications |
| 63 | + - SAUCE: apparmor4.0.0 [67/87]: userns - add the ability to reference a global |
| 64 | + variable for a feature value |
| 65 | + - SAUCE: apparmor4.0.0 [68/87]: userns - make it so special unconfined |
| 66 | + profiles can mediate user namespaces |
| 67 | + |
| 68 | + * Miscellaneous Ubuntu changes |
| 69 | + - SAUCE: apparmor4.0.0 [01/87]: LSM stacking v39: integrity: disassociate |
| 70 | + ima_filter_rule from security_audit_rule |
| 71 | + - SAUCE: apparmor4.0.0 [02/87]: LSM stacking v39: SM: Infrastructure |
| 72 | + management of the sock security |
| 73 | + - SAUCE: apparmor4.0.0 [03/87]: LSM stacking v39: LSM: Add the lsmblob data |
| 74 | + structure. |
| 75 | + - SAUCE: apparmor4.0.0 [04/87]: LSM stacking v39: IMA: avoid label collisions |
| 76 | + with stacked LSMs |
| 77 | + - SAUCE: apparmor4.0.0 [05/87]: LSM stacking v39: LSM: Use lsmblob in |
| 78 | + security_audit_rule_match |
| 79 | + - SAUCE: apparmor4.0.0 [06/87]: LSM stacking v39: LSM: Add lsmblob_to_secctx |
| 80 | + hook |
| 81 | + - SAUCE: apparmor4.0.0 [07/87]: LSM stacking v39: Audit: maintain an lsmblob |
| 82 | + in audit_context |
| 83 | + - SAUCE: apparmor4.0.0 [08/87]: LSM stacking v39: LSM: Use lsmblob in |
| 84 | + security_ipc_getsecid |
| 85 | + - SAUCE: apparmor4.0.0 [09/87]: LSM stacking v39: Audit: Update shutdown LSM |
| 86 | + data |
| 87 | + - SAUCE: apparmor4.0.0 [10/87]: LSM stacking v39: LSM: Use lsmblob in |
| 88 | + security_current_getsecid |
| 89 | + - SAUCE: apparmor4.0.0 [11/87]: LSM stacking v39: LSM: Use lsmblob in |
| 90 | + security_inode_getsecid |
| 91 | + - SAUCE: apparmor4.0.0 [12/87]: LSM stacking v39: Audit: use an lsmblob in |
| 92 | + audit_names |
| 93 | + - SAUCE: apparmor4.0.0 [13/87]: LSM stacking v39: LSM: Create new |
| 94 | + security_cred_getlsmblob LSM hook |
| 95 | + - SAUCE: apparmor4.0.0 [14/87]: LSM stacking v39: Audit: Change context data |
| 96 | + from secid to lsmblob |
| 97 | + - SAUCE: apparmor4.0.0 [15/87]: LSM stacking v39: Netlabel: Use lsmblob for |
| 98 | + audit data |
| 99 | + - SAUCE: apparmor4.0.0 [16/87]: LSM stacking v39: LSM: Ensure the correct LSM |
| 100 | + context releaser |
| 101 | + - SAUCE: apparmor4.0.0 [17/87]: LSM stacking v39: LSM: Use lsmcontext in |
| 102 | + security_secid_to_secctx |
| 103 | + - SAUCE: apparmor4.0.0 [18/87]: LSM stacking v39: LSM: Use lsmcontext in |
| 104 | + security_lsmblob_to_secctx |
| 105 | + - SAUCE: apparmor4.0.0 [19/87]: LSM stacking v39: LSM: Use lsmcontext in |
| 106 | + security_inode_getsecctx |
| 107 | + - SAUCE: apparmor4.0.0 [20/87]: LSM stacking v39: LSM: Use lsmcontext in |
| 108 | + security_dentry_init_security |
| 109 | + - SAUCE: apparmor4.0.0 [21/87]: LSM stacking v39: LSM: |
| 110 | + security_lsmblob_to_secctx module selection |
| 111 | + - SAUCE: apparmor4.0.0 [22/87]: LSM stacking v39: Audit: Create audit_stamp |
| 112 | + structure |
| 113 | + - SAUCE: apparmor4.0.0 [23/87]: LSM stacking v39: Audit: Allow multiple |
| 114 | + records in an audit_buffer |
| 115 | + - SAUCE: apparmor4.0.0 [24/87]: LSM stacking v39: Audit: Add record for |
| 116 | + multiple task security contexts |
| 117 | + - SAUCE: apparmor4.0.0 [25/87]: LSM stacking v39: audit: multiple subject lsm |
| 118 | + values for netlabel |
| 119 | + - SAUCE: apparmor4.0.0 [26/87]: LSM stacking v39: Audit: Add record for |
| 120 | + multiple object contexts |
| 121 | + - SAUCE: apparmor4.0.0 [27/87]: LSM stacking v39: LSM: Remove unused |
| 122 | + lsmcontext_init() |
| 123 | + - SAUCE: apparmor4.0.0 [28/87]: LSM stacking v39: LSM: Improve logic in |
| 124 | + security_getprocattr |
| 125 | + - SAUCE: apparmor4.0.0 [29/87]: LSM stacking v39: LSM: secctx provider check |
| 126 | + on release |
| 127 | + - SAUCE: apparmor4.0.0 [30/87]: LSM stacking v39: LSM: Single calls in |
| 128 | + socket_getpeersec hooks |
| 129 | + - SAUCE: apparmor4.0.0 [31/87]: LSM stacking v39: LSM: Exclusive secmark usage |
| 130 | + - SAUCE: apparmor4.0.0 [32/87]: LSM stacking v39: LSM: Identify which LSM |
| 131 | + handles the context string |
| 132 | + - SAUCE: apparmor4.0.0 [33/87]: LSM stacking v39: AppArmor: Remove the |
| 133 | + exclusive flag |
| 134 | + - SAUCE: apparmor4.0.0 [34/87]: LSM stacking v39: LSM: Add mount opts blob |
| 135 | + size tracking |
| 136 | + - SAUCE: apparmor4.0.0 [35/87]: LSM stacking v39: LSM: allocate mnt_opts blobs |
| 137 | + instead of module specific data |
| 138 | + - SAUCE: apparmor4.0.0 [36/87]: LSM stacking v39: LSM: Infrastructure |
| 139 | + management of the key security blob |
| 140 | + - SAUCE: apparmor4.0.0 [37/87]: LSM stacking v39: LSM: Infrastructure |
| 141 | + management of the mnt_opts security blob |
| 142 | + - SAUCE: apparmor4.0.0 [38/87]: LSM stacking v39: LSM: Correct handling of |
| 143 | + ENOSYS in inode_setxattr |
| 144 | + - SAUCE: apparmor4.0.0 [39/87]: LSM stacking v39: LSM: Remove lsmblob |
| 145 | + scaffolding |
| 146 | + - SAUCE: apparmor4.0.0 [40/87]: LSM stacking v39: LSM: Allow reservation of |
| 147 | + netlabel |
| 148 | + - SAUCE: apparmor4.0.0 [41/87]: LSM stacking v39: LSM: restrict |
| 149 | + security_cred_getsecid() to a single LSM |
| 150 | + - SAUCE: apparmor4.0.0 [42/87]: LSM stacking v39: Smack: Remove |
| 151 | + LSM_FLAG_EXCLUSIVE |
| 152 | + - SAUCE: apparmor4.0.0 [65/87] v6.8 prompt:fixup interruptible |
| 153 | + - SAUCE: apparmor4.0.0 [74/87]: apparmor: cleanup attachment perm lookup to |
| 154 | + use lookup_perms() |
| 155 | + - SAUCE: apparmor4.0.0 [75/87]: apparmor: remove redundant unconfined check. |
| 156 | + - SAUCE: apparmor4.0.0 [76/87]: apparmor: switch signal mediation to using |
| 157 | + RULE_MEDIATES |
| 158 | + - SAUCE: apparmor4.0.0 [77/87]: apparmor: ensure labels with more than one |
| 159 | + entry have correct flags |
| 160 | + - SAUCE: apparmor4.0.0 [78/87]: apparmor: remove explicit restriction that |
| 161 | + unconfined cannot use change_hat |
| 162 | + - SAUCE: apparmor4.0.0 [79/87]: apparmor: cleanup: refactor file_perm() to |
| 163 | + provide semantics of some checks |
| 164 | + - SAUCE: apparmor4.0.0 [80/87]: apparmor: carry mediation check on label |
| 165 | + - SAUCE: apparmor4.0.0 [81/87]: apparmor: convert easy uses of unconfined() to |
| 166 | + label_mediates() |
| 167 | + - SAUCE: apparmor4.0.0 [82/87]: apparmor: add additional flags to extended |
| 168 | + permission. |
| 169 | + - SAUCE: apparmor4.0.0 [83/87]: apparmor: add support for profiles to define |
| 170 | + the kill signal |
| 171 | + - SAUCE: apparmor4.0.0 [84/87]: apparmor: fix x_table_lookup when stacking is |
| 172 | + not the first entry |
| 173 | + - SAUCE: apparmor4.0.0 [85/87]: apparmor: allow profile to be transitioned |
| 174 | + when a user ns is created |
| 175 | + - SAUCE: apparmor4.0.0 [86/87]: apparmor: add ability to mediate caps with |
| 176 | + policy state machine |
| 177 | + - SAUCE: apparmor4.0.0 [87/87]: fixup notify |
| 178 | + - [Config] updateconfigs following v6.8-rc2 rebase |
| 179 | + |
| 180 | + -- Paolo Pisati < [email protected]> Mon, 29 Jan 2024 08:59:32 +0100 |
8 | 181 |
|
9 | 182 | linux-unstable (6.8.0-2.2) noble; urgency=medium
|
10 | 183 |
|
|
0 commit comments