Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

many: merge fixes from 2.57.6 #12380

Merged
merged 6 commits into from
Dec 1, 2022
Merged

many: merge fixes from 2.57.6 #12380

merged 6 commits into from
Dec 1, 2022

Commits on Nov 21, 2022

  1. data: Add systemd-tmpfiles configuration to create private tmp dir

    Use systemd-tmpfiles to create the private tmp mount namespace root
    dir (/tmp/snap-private-tmp) on boot as owned by root with restrictive
    permissions. We can use this as a known location to then create per-snap
    private tmp mount namespace dirs (/tmp/snap-private-tmp/snap.$SNAP_INSTANCE)
    etc.
    
    Signed-off-by: Alex Murray <alex.murray@canonical.com>
    alexmurray committed Nov 21, 2022
    Configuration menu
    Copy the full SHA
    6226cdc View commit details
    Browse the repository at this point in the history

Commits on Nov 23, 2022

  1. many: Use /tmp/snap-private-tmp for per-snap private tmps

    To avoid unprivileged users being able to interfere with the creation of the
    private snap mount namespace, instead of creating this as /tmp/snap.$SNAP_NAME/
    we can now use the systemd-tmpfiles configuration to do this for us
    at boot with a known fixed name (/tmp/snap-private-tmp/) and then use that as
    the base dir for creating per-snap private tmp mount
    namespaces (eg. /tmp/snap-private-tmp/snap.$SNAP_INSTANCE/tmp) etc.
    
    Signed-off-by: Alex Murray <alex.murray@canonical.com>
    alexmurray committed Nov 23, 2022
    Configuration menu
    Copy the full SHA
    21ebc51 View commit details
    Browse the repository at this point in the history
  2. tests/main/snap-confine-drops-sys-admin: use stat to check owner/perms

    The output format of ls could vary depending on the local systems locale etc whereas
    the output of stat is fixed so use this instead to check file owner /
    permissions.
    
    Signed-off-by: Alex Murray <alex.murray@canonical.com>
    alexmurray committed Nov 23, 2022
    Configuration menu
    Copy the full SHA
    d9d8c2f View commit details
    Browse the repository at this point in the history
  3. overlord/snapmgr: Bump vulnerable snap version check

    This should ensure that any older versions of snapd that are vulnerable to this
    new CVE-2022-3328 are uninstalled on upgrade to the fixed version.
    
    Signed-off-by: Alex Murray <alex.murray@canonical.com>
    alexmurray committed Nov 23, 2022
    Configuration menu
    Copy the full SHA
    1816f8d View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    2b1c574 View commit details
    Browse the repository at this point in the history

Commits on Nov 30, 2022

  1. Configuration menu
    Copy the full SHA
    bd6f966 View commit details
    Browse the repository at this point in the history