[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#940476: buster-pu: package tmpreaper/1.6.14+deb10u1



Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian.org@packages.debian.org
Usertags: pu

Hi,

tmpreaper will clean up PrivateTmp dirs of processes that systemd
started, leading to those services periodically crashing (and it's
usually hard to diagnose that tmpreaper was the culprit here).

This update adds those dirs to tmpreapers' whitelist.

The problem has existed for a longer time but seems aggravated since
buster, likely because more services have started to use PrivateTmp.


Kind regards,
Thijs

-- System Information:
Debian Release: 9.11
  APT prefers oldstable
  APT policy: (500, 'oldstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/2 CPU cores)
Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8), LANGUAGE=nl_NL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: sysvinit (via /sbin/init)
diff -Nru tmpreaper-1.6.14/ChangeLog tmpreaper-1.6.14+deb10u1/ChangeLog
--- tmpreaper-1.6.14/ChangeLog	2019-01-11 13:27:15.000000000 +0100
+++ tmpreaper-1.6.14+deb10u1/ChangeLog	2019-09-16 09:15:24.000000000 +0200
@@ -1,3 +1,11 @@
+tmpreaper (1.6.14+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Add `--protect '/tmp/systemd-private*/*'` to cron job to prevent
+    breaking systemd services that have PrivateTmp=true (closes: #881725).
+
+ -- Thijs Kinkhorst <thijs@debian.org>  Mon, 16 Sep 2019 07:15:24 +0000
+
 tmpreaper (1.6.14) unstable; urgency=medium
 
   * Upload to unstable to fix the race condition described in CVE-2019-3461:
diff -Nru tmpreaper-1.6.14/debian/changelog tmpreaper-1.6.14+deb10u1/debian/changelog
--- tmpreaper-1.6.14/debian/changelog	2019-01-11 13:27:15.000000000 +0100
+++ tmpreaper-1.6.14+deb10u1/debian/changelog	2019-09-16 09:15:24.000000000 +0200
@@ -1,3 +1,11 @@
+tmpreaper (1.6.14+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload with maintainer approval.
+  * Add `--protect '/tmp/systemd-private*/*'` to cron job to prevent
+    breaking systemd services that have PrivateTmp=true (closes: #881725).
+
+ -- Thijs Kinkhorst <thijs@debian.org>  Mon, 16 Sep 2019 07:15:24 +0000
+
 tmpreaper (1.6.14) unstable; urgency=medium
 
   * Upload to unstable to fix the race condition described in CVE-2019-3461:
diff -Nru tmpreaper-1.6.14/debian/cron.daily tmpreaper-1.6.14+deb10u1/debian/cron.daily
--- tmpreaper-1.6.14/debian/cron.daily	2008-05-19 19:10:16.000000000 +0200
+++ tmpreaper-1.6.14+deb10u1/debian/cron.daily	2019-09-16 09:15:24.000000000 +0200
@@ -105,5 +105,6 @@
   --protect '/tmp/lost+found' \
   --protect '/tmp/journal.dat' \
   --protect '/tmp/quota.{user,group}' \
+  --protect '/tmp/systemd-private*/*' \
   `for i in $TMPREAPER_PROTECT_EXTRA; do echo --protect "$i"; done` \
   $TMPREAPER_DIRS

Reply to: