1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
|
{% if arch in ('ppc64', 'ppc64el') %}
linux (6.10-1~exp2) unstable; urgency=medium
* From Linux 6.10, the default kernel on ppc64 and ppc64el
architectures uses 4k page size.
After rebooting, you need to re-create all swap files or partitions.
They depend on the page size and will be not longer usable. See
mkswap(8) on how to do that.
Some file systems might be incompatible with the smaller page size.
At least btrfs created with default settings is known to be affected
and they will not work with this kernel any more.
A btrfs file system can be checked with file(1) (use file -s). It
will show:
BTRFS Filesystem sectorsize 65536
If this number is larger then 4096, the file system can not be
mounted with the default kernel anymore.
If you are affected and require the 64k page size of older kernels,
you can install linux-image-powerpc64-64k or
linux-image-powerpc64el-64k packages.
-- Bastian Blank <waldi@debian.org> Thu, 11 Jul 2024 11:12:35 +0200
{% endif %}
linux (5.10.46-4) unstable; urgency=medium
* From Linux 5.10.46-4, unprivileged calls to bpf() are disabled by
default, mitigating several security issues. However, an admin can
still change this setting later on, if needed, by writing 0 or 1 to
the kernel.unprivileged_bpf_disabled sysctl.
If you prefer to keep unprivileged calls to bpf() enabled, set the
sysctl:
kernel.unprivileged_bpf_disabled = 0
which is the upstream default.
-- Salvatore Bonaccorso <carnil@debian.org> Mon, 02 Aug 2021 22:59:24 +0200
linux (5.10~rc7-1~exp2) unstable; urgency=medium
* From Linux 5.10, all users are allowed to create user namespaces by
default. This will allow programs such as web browsers and container
managers to create more restricted sandboxes for untrusted or
less-trusted code, without the need to run as root or to use a
setuid-root helper.
The previous Debian default was to restrict this feature to processes
running as root, because it exposed more security issues in the
kernel. However, the security benefits of more widespread sandboxing
probably now outweigh this risk.
If you prefer to keep this feature restricted, set the sysctl:
kernel.unprivileged_userns_clone = 0
-- Ben Hutchings <benh@debian.org> Sun, 13 Dec 2020 17:11:36 +0100
linux-latest (86) unstable; urgency=medium
* From Linux 4.13.10-1, AppArmor is enabled by default. This allows
defining a "profile" for each installed program that can mitigate
security vulnerabilities in it. However, an incorrect profile might
disable some functionality of the program.
In case you suspect that an AppArmor profile is incorrect, see
<https://lists.debian.org/debian-devel/2017/11/msg00178.html> and
consider reporting a bug in the package providing the profile. The
profile may be part of the program's package or apparmor-profiles.
-- Ben Hutchings <ben@decadent.org.uk> Thu, 30 Nov 2017 20:08:25 +0000
linux-latest (81) unstable; urgency=medium
* From Linux 4.10, the old 'virtual syscall' interface on 64-bit PCs
(amd64) is disabled. This breaks chroot environments and containers
that use (e)glibc 2.13 and earlier, including those based on Debian 7
or RHEL/CentOS 6. To re-enable it, set the kernel parameter:
vsyscall=emulate
-- Ben Hutchings <ben@decadent.org.uk> Fri, 30 Jun 2017 23:50:03 +0100
linux-latest (76) unstable; urgency=medium
* From Linux 4.8, several changes have been made in the kernel
configuration to 'harden' the system, i.e. to mitigate security bugs.
Some changes may cause legitimate applications to fail, and can be
reverted by run-time configuration:
- On most architectures, the /dev/mem device can no longer be used to
access devices that also have a kernel driver. This breaks dosemu
and some old user-space graphics drivers. To allow this, set the
kernel parameter: iomem=relaxed
- The kernel log is no longer readable by unprivileged users. To
allow this, set the sysctl: kernel.dmesg_restrict=0
-- Ben Hutchings <ben@decadent.org.uk> Sat, 29 Oct 2016 02:05:32 +0100
linux-latest (75) unstable; urgency=medium
* From Linux 4.7, the iptables connection tracking system will no longer
automatically load helper modules. If your firewall configuration
depends on connection tracking helpers, you should explicitly load the
required modules. For more information, see
<https://home.regit.org/netfilter-en/secure-use-of-helpers/>.
-- Ben Hutchings <ben@decadent.org.uk> Sat, 29 Oct 2016 01:53:18 +0100
|