1 |
On Thu, Jul 08, 2021 at 07:38:05PM -0700, Georgy Yakovlev wrote: |
2 |
> Signed-off-by: Sam James <sam@g.o> |
3 |
> Signed-off-by: Georgy Yakovlev <gyakovlev@g.o> |
4 |
> --- |
5 |
> .../2021-07-07-systemd-tmpfiles.en.txt | 48 +++++++++++++++++++ |
6 |
> 1 file changed, 48 insertions(+) |
7 |
> create mode 100644 2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt |
8 |
> |
9 |
> diff --git a/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt b/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt |
10 |
> new file mode 100644 |
11 |
> index 0000000..0960663 |
12 |
> --- /dev/null |
13 |
> +++ b/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt |
14 |
> @@ -0,0 +1,48 @@ |
15 |
> +Title: systemd-tmpfiles replaces opentmpfiles due to security issues |
16 |
> +Author: Georgy Yakovlev <gyakovlev@g.o> |
17 |
> +Author: Sam James <sam@g.o> |
18 |
> +Posted: 2021-07-07 |
19 |
> +Revision: 1 |
20 |
> +News-Item-Format: 2.0 |
21 |
> +Display-If-Installed: virtual/tmpfiles |
22 |
|
23 |
This should be: |
24 |
|
25 |
Display-If-Installed: sys-apps/opentmpfiles |
26 |
|
27 |
> + |
28 |
> +On 2021-07-06, the sys-apps/opentmpfiles package was masked due to a |
29 |
> +root privilege escalation vulnerability (CVE-2017-18925 [0], |
30 |
> +bug #751415 [1], issue 4 [2] upstream). |
31 |
> + |
32 |
> +The use of opentmpfiles is discouraged by its maintainer due to the |
33 |
> +unpatched vulnerability and other long-standing bugs [3]. |
34 |
> + |
35 |
> +Users will start seeing their package manager trying to replace |
36 |
> +sys-apps/opentmpfiles with sys-apps/systemd-tmpfiles because it is |
37 |
> +another provider of virtual/tmpfiles. |
38 |
> + |
39 |
> +Despite the name, 'systemd-tmpfiles' does not depend on systemd, does |
40 |
> +not use dbus, and is just a drop-in replacement for opentmpfiles. It is |
41 |
> +a small binary built from systemd source code, but works separately, |
42 |
> +similarly to eudev or elogind. It is known to work on both glibc and |
43 |
> +musl systems. |
44 |
> + |
45 |
> +Note that systemd-tmpfiles is specifically for non-systemd systems. It |
46 |
> +is intended to be used on an OpenRC system. |
47 |
> + |
48 |
> +If you wish to selectively test systemd-tmpfiles, follow those steps: |
49 |
> + |
50 |
> + 1. # emerge --oneshot sys-apps/systemd-tmpfiles |
51 |
> + 2. # reboot |
52 |
> + |
53 |
> +No other steps required. |
54 |
> + |
55 |
> +If, after reviewing the linked bug reference for opentmpfiles, you feel |
56 |
> +your system is not vulnerable/applicable to the attack described, you |
57 |
> +can unmask[4] opentmpfiles at your own risk: |
58 |
> + |
59 |
> +1. In /etc/portage/package.unmask, add: |
60 |
> +-sys-apps/opentmpfiles |
61 |
> +2. # emerge --oneshot sys-apps/opentmpfiles |
62 |
|
63 |
Something might need to be added cautioning folks that if they unmask |
64 |
this, it may disappear on them in the future if we decide to remove it. |
65 |
|
66 |
William |
67 |
|
68 |
> + |
69 |
> +[0] https://nvd.nist.gov/vuln/detail/CVE-2017-18925 |
70 |
> +[1] https://bugs.gentoo.org/751415 |
71 |
> +[2] https://github.com/OpenRC/opentmpfiles/issues/4 |
72 |
> +[3] https://bugs.gentoo.org/741216 |
73 |
> +[4] https://wiki.gentoo.org/wiki/Knowledge_Base:Unmasking_a_package |
74 |
> -- |
75 |
> 2.32.0 |
76 |
> |
77 |
> |