Linux 4.17 Released06 Jun 2018 tags: audit selinux
Linux v4.17 was released on Sunday, June 3rd; this is a quick summary of the SELinux and audit changes. After a small set of changes in Linux v4.16 we are back to a more normal, perhaps even a bit larger than normal, set of changes in Linux v4.17.
While we added basic support for SCTP sockets in Linux v4.11, via the "sctp_socket" object class, proper SELinux support for SCTP was not available until this release. Richard Haines was responsible for the development of the SCTP support, and documented the new controls in the Linux Kernel's "Documentation/security" directory; I encourage you to check out the LSM-sctp.rst and SELinux-sctp.rst files in that directory for more details.
As a reminder, ensure that your currently loaded SELinux policy has the "extended_socket_class" policy capability enabled before attempting to use the new SELinux SCTP controls.
Stephen Smalley submitted a number of patches to encapsulate much of the kernel's global SELinux state into a number of new data structures. While this was a very large change to the code, none of it should be user visible. It is simply an important piece of housekeeping that paves the way for a number of improvements and new features that are currently under development.
Fixed a small bug with setxattr(2) where we were not adequately protecting against malformed file security labels that were written by privileged applications. In addition to Linux v4.17, this fix should also start appearing in the different stable kernel releases; check the changelogs.
Various small code cleanups and simplifications.
After being marked as deprecated for several years, the audit "entry" filter was removed from the kernel. The "entry" filter was removed from the audit userspace tools in v2.6.7.
Fixed a small bug where creating a session ID audit filter could cause the "arch" field to be misrepresented in the various different audit records.
The code which interpreted the "audit=" configuration parameter on the kernel command line was improved to make it more robust and accept a wider range of user input, e.g. both "on" and "off" are now valid options.
Fix a number of issues relating to the auditing of symlinks. Fixes include honoring the current audit enabled status, as well proper auditing of the related PATH records.
Various other small bug fixes, code cleanups, and simplifications.