Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-09 Thread MichaIng
Your right /tmp is not a tmpfs by default on Debian. I though it was, maybe being too much used to it as this is configured by default on our images. /dev/shm or /run would work better then, although /run IMO is more aimed for non-temporary files, relevant through the whole runtime of the relat

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-09 Thread MichaIng
Please note that it by default appears on Bullseye only. See that last mails regarding this issue, the related changed sysfs setting has identified already do: --- sysctl fs.protected_regular=2 --- and retry the steps, which will then fail. --- sysctl fs.protected_regular=0 --- t

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
Am 08.12.2020 um 22:03 schrieb Greg Wooledge: Unexpected clobberin' by root is the actual *worst* case that this security feature is trying to protect against. Imagine this hypothetical scenario: 1) Process A running as regular user alice creates a temp file in /tmp, owned by alice. 2) Dum

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
I think the topic with the modes just applies when the file is actually created, hence not existing yet. However, aiming for a method to edit a file without O_CREAT, and voila: --- root@VM-Bullseye:~# cat testdir/testfile 143 root@VM-Bullseye:~# sed -i 's/1/5/' testdir/testfile root@VM-Bulls

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
Good idea, although it would have been recognised much earlier during nearly every normal system operation: --- root@micha:/tmp# set -o | grep noclobber noclobber off --- strace is a fantastic idea, but it seems to fail on the lowest level "EACCES (Permission denied)": --- ro

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
Am 08.12.2020 um 16:55 schrieb to...@tuxteam.de: @Tomas: --- root@VM-Bullseye:/tmp# id uid=0(root) gid=0(root) groups=0(root) root@VM-Bullseye:/tmp# >> testfile -bash: testfile: Permission denied root@VM-Bullseye:/tmp# dash -c '>> testfile' dash: 1: cannot create testfile: Permission denied

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
Am 08.12.2020 um 16:15 schrieb Greg Wooledge: It *has* to be related to the kernel. Where else would the permissions (capabilities) be applied? That is exactly what I am wondering about. Those are pretty minimal Debian install, no SELinux and no AppArmor actively installed, only what is pull

Re: Where to report: root fails to edit other users file in sticky bit directory

2020-12-08 Thread MichaIng
Sorry for the late reply guys, I was not subscribed to the list, just got the address from the bug report instructions in case the related package could not be identified, and thought I get an answer directly to my mailbox xD: https://www.debian.org/Bugs/Reporting.en.html Back to topic. I tot

Where to report: root fails to edit other users file in sticky bit directory

2020-12-04 Thread MichaIng
Hi Debian team, I'm sorry to contact you here, but I ran into an IMO extremely important bug where I don't know which package is actually responsible. Even the root user is not permitted to write to an existing file that is owned by another user within a sticky bit directory: --- 2020-12