From 32bcbd73e0988d2d2237690ffae33b4f5cc5ff81 Mon Sep 17 00:00:00 2001 From: Julian Andres Klode Date: Sun, 22 Oct 2017 23:34:03 +0200 Subject: Sandbox methods with seccomp-BPF; except cdrom, gpgv, rsh This reduces the number of syscalls to about 140 from about 350 or so, significantly reducing security risks. Also change prepare-release to ignore the architecture lists in the build dependencies when generating the build-depends package for travis. We might want to clean up things a bit more and/or move it somewhere else. --- debian/NEWS | 13 +++++++++++++ 1 file changed, 13 insertions(+) (limited to 'debian/NEWS') diff --git a/debian/NEWS b/debian/NEWS index 9a93de69e..7ad20ccd6 100644 --- a/debian/NEWS +++ b/debian/NEWS @@ -1,3 +1,16 @@ +apt (1.6~alpha1) UNRELEASED; urgency=medium + + All methods provided by apt except for cdrom, gpgv, and rsh now + use seccomp-BPF sandboxing to restrict the list of allowed system + calls, and trap all others with a SIGSYS signal. Three options + can be used to configure this further: + + APT::Sandbox::Seccomp is a boolean to turn it on/off + APT::Sandbox::Seccomp::Trap is a list of names of more syscalls to trap + APT::Sandbox::Seccomp::Allow is a list of names of more syscalls to allow + + -- Julian Andres Klode Sun, 22 Oct 2017 22:29:58 +0200 + apt (1.5~beta1) unstable; urgency=medium [ New HTTPS method ] -- cgit v1.2.3