Back to bug 1375750
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Ondrej Moriš | 2016-10-05 14:33:17 UTC | Priority | unspecified | medium |
| CC | omoris | |||
| Hardware | Unspecified | All | ||
| OS | Unspecified | Linux | ||
| Severity | unspecified | low | ||
| Ondrej Moriš | 2017-02-20 11:49:01 UTC | QA Contact | qe-baseos-security | omoris |
| Ondrej Moriš | 2017-11-28 11:59:21 UTC | CC | pwouters | |
| Flags | needinfo?(pwouters) | |||
| Paul Wouters | 2017-11-28 14:32:05 UTC | Status | NEW | MODIFIED |
| Flags | needinfo?(pwouters) | |||
| errata-xmlrpc | 2017-11-28 14:34:00 UTC | Status | MODIFIED | ON_QA |
| Ondrej Moriš | 2017-12-08 12:21:42 UTC | Fixed In Version | libreswan-3.22-4.el7 | |
| Ondrej Moriš | 2017-12-08 14:59:43 UTC | Flags | needinfo?(pwouters) | |
| Paul Wouters | 2017-12-08 16:01:42 UTC | Flags | needinfo?(pwouters) | |
| Paul Wouters | 2017-12-11 17:54:43 UTC | CC | pmoore | |
| Ondrej Moriš | 2018-01-04 11:11:46 UTC | Status | ON_QA | ASSIGNED |
| Ondrej Moriš | 2018-01-09 14:12:10 UTC | Flags | needinfo?(pwouters) | |
| Paul Wouters | 2018-01-09 17:15:08 UTC | Flags | needinfo?(pwouters) | |
| Ondrej Moriš | 2018-01-10 20:39:38 UTC | Status | ASSIGNED | ON_QA |
| Ondrej Moriš | 2018-01-19 19:33:26 UTC | Flags | needinfo?(pwouters) | |
| Paul Wouters | 2018-01-19 22:57:17 UTC | Flags | needinfo?(pwouters) | |
| Ondrej Moriš | 2018-01-28 21:01:32 UTC | Status | ON_QA | ASSIGNED |
| Ondrej Moriš | 2018-01-29 15:55:08 UTC | CC | mgrepl | |
| Flags | needinfo?(mgrepl) | |||
| Ondrej Moriš | 2018-01-29 17:31:09 UTC | CC | lmiksik | |
| Flags | needinfo?(mgrepl) | needinfo?(lmiksik) | ||
| Jaroslav Reznik | 2018-02-05 13:40:12 UTC | CC | jreznik | |
| Flags | needinfo?(lmiksik) | |||
| Paul Wouters | 2018-02-05 19:11:26 UTC | Doc Text | Feature: A new option seccomp=yes enables syscall secrutiy by whitelisting all the syscalls that libreswan is allowed to execute. | |
| Doc Type | If docs needed, set a value | Enhancement | ||
| Paul Wouters | 2018-02-06 16:38:37 UTC | Doc Text | Feature: A new option seccomp=yes enables syscall secrutiy by whitelisting all the syscalls that libreswan is allowed to execute. | Feature: A new option seccomp=enabled enables syscall security by whitelisting all the system calls that libreswan is allowed to execute. |
| Paul Wouters | 2018-02-06 16:39:01 UTC | Status | ASSIGNED | MODIFIED |
| errata-xmlrpc | 2018-02-06 22:13:42 UTC | Status | MODIFIED | ON_QA |
| Ondrej Moriš | 2018-02-07 22:21:43 UTC | Status | ON_QA | ASSIGNED |
| Paul Wouters | 2018-02-08 14:57:21 UTC | Status | ASSIGNED | ON_QA |
| Ondrej Moriš | 2018-02-12 14:55:25 UTC | See Also | https://bugzilla.redhat.com/show_bug.cgi?id=1544463 | |
| Ondrej Moriš | 2018-02-12 15:34:47 UTC | Status | ON_QA | VERIFIED |
| CC | mjahoda | |||
| Flags | needinfo?(mjahoda) | |||
| Mirek Jahoda | 2018-02-12 16:01:17 UTC | Flags | needinfo?(mjahoda) | |
| Mirek Jahoda | 2018-02-12 16:03:40 UTC | Docs Contact | mjahoda | |
| Mirek Jahoda | 2018-02-14 15:08:49 UTC | Doc Text | Feature: A new option seccomp=enabled enables syscall security by whitelisting all the system calls that libreswan is allowed to execute. | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. |
| Mirek Jahoda | 2018-02-19 11:56:56 UTC | Doc Text | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. See the `ipsec.conf(5)` man page for more information. |
| Mirek Jahoda | 2018-02-19 12:01:48 UTC | Doc Text | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. See the `ipsec.conf(5)` man page for more information. | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages as a Technology Preview. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. See the `ipsec.conf(5)` man page for more information. |
| Doc Type | Enhancement | Technology Preview | ||
| Mirek Jahoda | 2018-03-01 14:46:13 UTC | Doc Text | SECCOMP can be now enabled in _libreswan_ Support for SECCOMP (Secure Computing mode) through the "seccomp=enabled|tolerant|disabled" option has been added to the _libreswan_ packages as a Technology Preview. This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. See the `ipsec.conf(5)` man page for more information. | SECCOMP can be now enabled in _libreswan_ As a Technology Preview, the "seccomp=enabled|tolerant|disabled" option has been added to the `ipsec.conf` configuration file, which makes it possible to use the Secure Computing mode (SECCOMP). This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. For more information, see the `ipsec.conf(5)` man page. |
| errata-xmlrpc | 2018-04-10 03:08:48 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2018-04-10 17:22:34 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2018-04-10 13:22:34 UTC | |||
| errata-xmlrpc | 2018-04-10 17:23:18 UTC | Link ID | Red Hat Product Errata RHBA-2018:0932 | |
| Lenka Špačková | 2019-04-21 09:35:33 UTC | Doc Text | SECCOMP can be now enabled in _libreswan_ As a Technology Preview, the "seccomp=enabled|tolerant|disabled" option has been added to the `ipsec.conf` configuration file, which makes it possible to use the Secure Computing mode (SECCOMP). This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. For more information, see the `ipsec.conf(5)` man page. | .SECCOMP can be now enabled in _libreswan_ As a Technology Preview, the `seccomp=enabled|tolerant|disabled` option has been added to the `ipsec.conf` configuration file, which makes it possible to use the Secure Computing mode (SECCOMP). This improves the syscall security by whitelisting all the system calls that *Libreswan* is allowed to execute. For more information, see the `ipsec.conf(5)` man page. |
Back to bug 1375750