summaryrefslogtreecommitdiffstats
path: root/debian/linux-image.NEWS
blob: f8e1fc022907f8c242ad31da132ed8d2cc753ded (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
linux (5.10.46-4) unstable; urgency=medium

  * From Linux 5.10.46-4, unprivileged calls to bpf() are disabled by
    default, mitigating several security issues. However, an admin can
    still change this setting later on, if needed, by writing 0 or 1 to
    the kernel.unprivileged_bpf_disabled sysctl.

    If you prefer to keep unprivileged calls to bpf() enabled, set the
    sysctl:

    kernel.unprivileged_bpf_disabled = 0

    which is the upstream default.

 -- Salvatore Bonaccorso <carnil@debian.org>  Mon, 02 Aug 2021 22:59:24 +0200

linux (5.10~rc7-1~exp2) unstable; urgency=medium

  * From Linux 5.10, all users are allowed to create user namespaces by
    default.  This will allow programs such as web browsers and container
    managers to create more restricted sandboxes for untrusted or
    less-trusted code, without the need to run as root or to use a
    setuid-root helper.

    The previous Debian default was to restrict this feature to processes
    running as root, because it exposed more security issues in the
    kernel.  However, the security benefits of more widespread sandboxing
    probably now outweigh this risk.

    If you prefer to keep this feature restricted, set the sysctl:

        kernel.unprivileged_userns_clone = 0

 -- Ben Hutchings <benh@debian.org>  Sun, 13 Dec 2020 17:11:36 +0100

linux-latest (86) unstable; urgency=medium

  * From Linux 4.13.10-1, AppArmor is enabled by default.  This allows
    defining a "profile" for each installed program that can mitigate
    security vulnerabilities in it.  However, an incorrect profile might
    disable some functionality of the program.

    In case you suspect that an AppArmor profile is incorrect, see
    <https://lists.debian.org/debian-devel/2017/11/msg00178.html> and
    consider reporting a bug in the package providing the profile.  The
    profile may be part of the program's package or apparmor-profiles.

 -- Ben Hutchings <ben@decadent.org.uk>  Thu, 30 Nov 2017 20:08:25 +0000

linux-latest (81) unstable; urgency=medium

  * From Linux 4.10, the old 'virtual syscall' interface on 64-bit PCs
    (amd64) is disabled.  This breaks chroot environments and containers
    that use (e)glibc 2.13 and earlier, including those based on Debian 7
    or RHEL/CentOS 6.  To re-enable it, set the kernel parameter:
    vsyscall=emulate

 -- Ben Hutchings <ben@decadent.org.uk>  Fri, 30 Jun 2017 23:50:03 +0100

linux-latest (76) unstable; urgency=medium

  * From Linux 4.8, several changes have been made in the kernel
    configuration to 'harden' the system, i.e. to mitigate security bugs.
    Some changes may cause legitimate applications to fail, and can be
    reverted by run-time configuration:
    - On most architectures, the /dev/mem device can no longer be used to
      access devices that also have a kernel driver.  This breaks dosemu
      and some old user-space graphics drivers.  To allow this, set the
      kernel parameter: iomem=relaxed
    - The kernel log is no longer readable by unprivileged users.  To
      allow this, set the sysctl: kernel.dmesg_restrict=0

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 29 Oct 2016 02:05:32 +0100

linux-latest (75) unstable; urgency=medium

  * From Linux 4.7, the iptables connection tracking system will no longer
    automatically load helper modules.  If your firewall configuration
    depends on connection tracking helpers, you should explicitly load the
    required modules.  For more information, see
    <https://home.regit.org/netfilter-en/secure-use-of-helpers/>.

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 29 Oct 2016 01:53:18 +0100