[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#880638: marked as done (release-notes: Document apt sandbox support [buster])



Your message dated Thu, 9 May 2019 22:00:46 +0200
with message-id <118a5845-8d14-54ec-1c59-1f9eb3d8e17e@debian.org>
and subject line Re: Bug#880638: release-notes: Document apt sandbox support [buster]
has caused the Debian Bug report #880638,
regarding release-notes: Document apt sandbox support [buster]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
880638: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880638
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release-notes
Severity: wishlist

--- News for apt (libapt-pkg5.0 libapt-inst2.0) ---
apt (1.6~alpha1) unstable; urgency=medium

  All methods provided by apt except for cdrom, gpgv, and rsh now
  use seccomp-BPF sandboxing to restrict the list of allowed system
  calls, and trap all others with a SIGSYS signal. Three options
  can be used to configure this further:

    APT::Sandbox::Seccomp is a boolean to turn it on/off
    APT::Sandbox::Seccomp::Trap is a list of names of more syscalls to trap
    APT::Sandbox::Seccomp::Allow is a list of names of more syscalls to allow

  Also, sandboxing is now enabled for the mirror method.

 -- Julian Andres Klode <jak@debian.org>  Mon, 23 Oct 2017 01:58:18 +0200


Seems like it would be prudent to mention that in the release-notes
for buster.

Thanks,
~Niels

--- End Message ---
--- Begin Message ---
On 05-05-2019 20:00, Niels Thykier wrote:
> I think it would make sense for two reasons:
>  1) We had a severe security bug in apt recently and while sandboxing
>     would not have prevented it, it still shows that the apt developers
>     have been working on hardening apt in general and against future
>     threats.
>  2) We advertise apparmor as a new default/recommendation to harden
>     Debian.  The apt sandboxing would strengthen the image of buster
>     providing better (opt-in) security compared to stretch.
> 
> But yes, it should certainly only be in "whats-new" given it is opt-in.

Commit 8bb5c11

Paul

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---

Reply to: