On Wednesday 13 February 2008 07:54:04 pm Luk Claes wrote:
> sean finney wrote:
> > hi everyone,
>
> Hi
>
> > okay, it looks like the problem was that the person who did the security
> > upload built the package in a sarge chroot without /proc mounted (i can
> > duplicate the problem unmounting /proc in my pbuilder chroot).
> >
> > so, my question is what are the next steps?  can the security team just
> > trigger a rebuild/binNMU, or do we need another sourceful upload?  if so
> > should i provide an update in debian/rules that checks for /proc to be
> > mounted just in case this happens again?

> I think I can schedule binNMUs now though the buildds have to have proc
> mounted beforehand or the one signing has to be careful enough not to
> sign if it's not yet fixed with the binNMU.
>
> So I guess that's up to the Security Team to decide.

i don't think this was a problem on any of the buildds this time around, 
though someone ought to do a dpkg-deb --contents foo.deb | grep check_procs 
on the debs "just to make sure"...  or alternatively i could copy the check 
from debian/rules in etch for a new upload.  i'll go with whatever the 
security peeps say.

> You do check for a mounted proc in the unstable/testing/experimental
> version, right? I kind of remember seeing it as the check fails even if
> there is a proc mounted from outside the chroot...

the etch and lenny/sid versions both have explicit checks for a mounted /proc 
in debian/rules (test -d /proc/1), yes.


        sean

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to