Gentoo Archives: gentoo-dev

From: Georgy Yakovlev <gyakovlev@g.o>
To: gentoo-dev@l.g.o
Cc: Georgy Yakovlev <gyakovlev@g.o>, Sam James <sam@g.o>
Subject: [gentoo-dev] [PATCH] 2021-07-07-systemd-tmpfiles: add news item
Date: Fri, 09 Jul 2021 02:38:22
Message-Id: 20210709023805.1357699-1-gyakovlev@gentoo.org
1 Signed-off-by: Sam James <sam@g.o>
2 Signed-off-by: Georgy Yakovlev <gyakovlev@g.o>
3 ---
4 .../2021-07-07-systemd-tmpfiles.en.txt | 48 +++++++++++++++++++
5 1 file changed, 48 insertions(+)
6 create mode 100644 2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt
7
8 diff --git a/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt b/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt
9 new file mode 100644
10 index 0000000..0960663
11 --- /dev/null
12 +++ b/2021-07-07-systemd-tmpfiles/2021-07-07-systemd-tmpfiles.en.txt
13 @@ -0,0 +1,48 @@
14 +Title: systemd-tmpfiles replaces opentmpfiles due to security issues
15 +Author: Georgy Yakovlev <gyakovlev@g.o>
16 +Author: Sam James <sam@g.o>
17 +Posted: 2021-07-07
18 +Revision: 1
19 +News-Item-Format: 2.0
20 +Display-If-Installed: virtual/tmpfiles
21 +
22 +On 2021-07-06, the sys-apps/opentmpfiles package was masked due to a
23 +root privilege escalation vulnerability (CVE-2017-18925 [0],
24 +bug #751415 [1], issue 4 [2] upstream).
25 +
26 +The use of opentmpfiles is discouraged by its maintainer due to the
27 +unpatched vulnerability and other long-standing bugs [3].
28 +
29 +Users will start seeing their package manager trying to replace
30 +sys-apps/opentmpfiles with sys-apps/systemd-tmpfiles because it is
31 +another provider of virtual/tmpfiles.
32 +
33 +Despite the name, 'systemd-tmpfiles' does not depend on systemd, does
34 +not use dbus, and is just a drop-in replacement for opentmpfiles. It is
35 +a small binary built from systemd source code, but works separately,
36 +similarly to eudev or elogind. It is known to work on both glibc and
37 +musl systems.
38 +
39 +Note that systemd-tmpfiles is specifically for non-systemd systems. It
40 +is intended to be used on an OpenRC system.
41 +
42 +If you wish to selectively test systemd-tmpfiles, follow those steps:
43 +
44 + 1. # emerge --oneshot sys-apps/systemd-tmpfiles
45 + 2. # reboot
46 +
47 +No other steps required.
48 +
49 +If, after reviewing the linked bug reference for opentmpfiles, you feel
50 +your system is not vulnerable/applicable to the attack described, you
51 +can unmask[4] opentmpfiles at your own risk:
52 +
53 +1. In /etc/portage/package.unmask, add:
54 +-sys-apps/opentmpfiles
55 +2. # emerge --oneshot sys-apps/opentmpfiles
56 +
57 +[0] https://nvd.nist.gov/vuln/detail/CVE-2017-18925
58 +[1] https://bugs.gentoo.org/751415
59 +[2] https://github.com/OpenRC/opentmpfiles/issues/4
60 +[3] https://bugs.gentoo.org/741216
61 +[4] https://wiki.gentoo.org/wiki/Knowledge_Base:Unmasking_a_package
62 --
63 2.32.0

Replies