On 11/26/20 5:57 PM, Thomas Deutschmann wrote:
>
> I disagree here: Packages installing tmpfiles configs requiring
> recursive chown on each boot are doing something wrong from my P.O.V.
No argument there, but me thinking they're wrong doesn't stop people
from doing it.
> Note that hardlinks a
On Thu, 2020-11-26 at 17:45 -0500, Michael Orlitzky wrote:
> On 11/26/20 5:37 PM, Peter Stuge wrote:
> > Georgy Yakovlev wrote:
> > > I'll be switching default tmpfiles provider to sys-apps/systemd-
> > > tmpfiles
> > > by the end of the week by updating virtual/tmpfiles ebuild.
> >
> > Michael Or
On 2020-11-26 21:36, Michael Orlitzky wrote:
Most of these security issues were fixed in systemd-tmpfiles years ago,
and you can easily find upstream tmpfiles.d entries that contain e.g.
"Z" entries. In that case, the upstream file is not in error, and root
doesn't have to be actively tricked int
On 11/26/20 5:37 PM, Peter Stuge wrote:
> Georgy Yakovlev wrote:
>> I'll be switching default tmpfiles provider to sys-apps/systemd-tmpfiles
>> by the end of the week by updating virtual/tmpfiles ebuild.
>
> Michael Orlitzky wrote:
>> Corollary: the tmpfiles.d specification can only be implemented
> On 26 Nov 2020, at 22:37, Peter Stuge wrote:
> Michael Orlitzky wrote:
>> Corollary: the tmpfiles.d specification can only be implemented (safely)
>> on Linux after all.
>
> So should virtual/tmpfiles differentiate based on system?
>
It won’t be keyworded where it’s not available so Portage
Georgy Yakovlev wrote:
> I'll be switching default tmpfiles provider to sys-apps/systemd-tmpfiles
> by the end of the week by updating virtual/tmpfiles ebuild.
Michael Orlitzky wrote:
> Corollary: the tmpfiles.d specification can only be implemented (safely)
> on Linux after all.
So should virtua
On 11/26/20 10:07 AM, Thomas Deutschmann wrote:
>
> Only root is allowed to write to these directories. In other words: To
> exploit this, a malicious local user (or a remote attacker who already
> gained user access) would have to trick root into creating specially
> crafted tmpfiles config allow
Dear all,
sorting packages in a group of "misc" packages was not useful.
We have to dissolve the project desktop-misc
There are some tickets which should be closed first before we reassign
the packages to maintainer-needed.
It would be good to review if there are packages which have to be tre
Hi,
I don't have any objections regarding the change of the default tmpfiles
provider but I would like to classify the vulnerability:
On 2020-11-25 22:57, Georgy Yakovlev wrote:
In case you don't know, opentmpfiles has an open CVE CVE-2017-18925:
root privilege escalation by symlink attack
h
Hi.
Also created https://github.com/gentoo/gentoo/pull/18411 for taking
maintainership.
чт, 26 нояб. 2020 г. в 12:01, Bernard Cafarelli :
>
> Le Thu, 26 Nov 2020 00:27:53 +0100
> Jonas Stein a écrit:
>
> > Dear all
> >
> > the following packages are up for grabs while dissolving
> > the desktop-m
Le Thu, 26 Nov 2020 00:27:53 +0100
Jonas Stein a écrit:
> Dear all
>
> the following packages are up for grabs while dissolving
> the desktop-misc project:
>
> x11-misc/zim
> https://packages.gentoo.org/packages/x11-misc/zim
>
> It is a very powerful deskop wiki which is written in python. It
11 matches
Mail list logo