Bug#940476: buster-pu: package tmpreaper/1.6.14+deb10u1

2019-10-12 Thread Julien Cristau
Control: tag -1 confirmed

On Mon, Sep 16, 2019 at 11:28:11AM +0200, Thijs Kinkhorst wrote:
> diff -Nru tmpreaper-1.6.14/debian/changelog 
> tmpreaper-1.6.14+deb10u1/debian/changelog
> --- tmpreaper-1.6.14/debian/changelog 2019-01-11 13:27:15.0 +0100
> +++ tmpreaper-1.6.14+deb10u1/debian/changelog 2019-09-16 09:15:24.0 
> +0200
> @@ -1,3 +1,11 @@
> +tmpreaper (1.6.14+deb10u1) buster; urgency=medium
> +
> +  * Non-maintainer upload with maintainer approval.
> +  * Add `--protect '/tmp/systemd-private*/*'` to cron job to prevent
> +breaking systemd services that have PrivateTmp=true (closes: #881725).
> +
> + -- Thijs Kinkhorst   Mon, 16 Sep 2019 07:15:24 +
> +
>  tmpreaper (1.6.14) unstable; urgency=medium
>  
>* Upload to unstable to fix the race condition described in CVE-2019-3461:

Go ahead.

Cheers,
Julien



Bug#940476: buster-pu: package tmpreaper/1.6.14+deb10u1

2019-09-16 Thread Thijs Kinkhorst
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Hi,

tmpreaper will clean up PrivateTmp dirs of processes that systemd
started, leading to those services periodically crashing (and it's
usually hard to diagnose that tmpreaper was the culprit here).

This update adds those dirs to tmpreapers' whitelist.

The problem has existed for a longer time but seems aggravated since
buster, likely because more services have started to use PrivateTmp.


Kind regards,
Thijs

-- System Information:
Debian Release: 9.11
  APT prefers oldstable
  APT policy: (500, 'oldstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/2 CPU cores)
Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8), 
LANGUAGE=nl_NL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: sysvinit (via /sbin/init)
diff -Nru tmpreaper-1.6.14/ChangeLog tmpreaper-1.6.14+deb10u1/ChangeLog
--- tmpreaper-1.6.14/ChangeLog  2019-01-11 13:27:15.0 +0100
+++ tmpreaper-1.6.14+deb10u1/ChangeLog  2019-09-16 09:15:24.0 +0200
@@ -1,3 +1,11 @@
+tmpreaper (1.6.14+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Add `--protect '/tmp/systemd-private*/*'` to cron job to prevent
+breaking systemd services that have PrivateTmp=true (closes: #881725).
+
+ -- Thijs Kinkhorst   Mon, 16 Sep 2019 07:15:24 +
+
 tmpreaper (1.6.14) unstable; urgency=medium
 
   * Upload to unstable to fix the race condition described in CVE-2019-3461:
diff -Nru tmpreaper-1.6.14/debian/changelog 
tmpreaper-1.6.14+deb10u1/debian/changelog
--- tmpreaper-1.6.14/debian/changelog   2019-01-11 13:27:15.0 +0100
+++ tmpreaper-1.6.14+deb10u1/debian/changelog   2019-09-16 09:15:24.0 
+0200
@@ -1,3 +1,11 @@
+tmpreaper (1.6.14+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Add `--protect '/tmp/systemd-private*/*'` to cron job to prevent
+breaking systemd services that have PrivateTmp=true (closes: #881725).
+
+ -- Thijs Kinkhorst   Mon, 16 Sep 2019 07:15:24 +
+
 tmpreaper (1.6.14) unstable; urgency=medium
 
   * Upload to unstable to fix the race condition described in CVE-2019-3461:
diff -Nru tmpreaper-1.6.14/debian/cron.daily 
tmpreaper-1.6.14+deb10u1/debian/cron.daily
--- tmpreaper-1.6.14/debian/cron.daily  2008-05-19 19:10:16.0 +0200
+++ tmpreaper-1.6.14+deb10u1/debian/cron.daily  2019-09-16 09:15:24.0 
+0200
@@ -105,5 +105,6 @@
   --protect '/tmp/lost+found' \
   --protect '/tmp/journal.dat' \
   --protect '/tmp/quota.{user,group}' \
+  --protect '/tmp/systemd-private*/*' \
   `for i in $TMPREAPER_PROTECT_EXTRA; do echo --protect "$i"; done` \
   $TMPREAPER_DIRS