Control: tags -1 - moreinfo
Please find the new debdiff attached.
diff -Nru xfsprogs-6.13.0/debian/changelog xfsprogs-6.13.0/debian/changelog --- xfsprogs-6.13.0/debian/changelog 2025-02-23 15:32:04.000000000 +0100 +++ xfsprogs-6.13.0/debian/changelog 2026-03-04 12:28:29.000000000 +0100 @@ -1,3 +1,10 @@ +xfsprogs (6.13.0-2+deb13u1) trixie; urgency=medium + + * xfs_scrub_fail: reduce security lockdowns to avoid postfix problems + (Closes: #1116595) + + -- Bastian Germann <[email protected]> Wed, 04 Mar 2026 12:28:29 +0100 + xfsprogs (6.13.0-2) unstable; urgency=medium * Patch: mkfs: Correct filesize declaration diff -Nru xfsprogs-6.13.0/debian/patches/reduce-security-lockdowns-to-avoid-postfix-problems.patch xfsprogs-6.13.0/debian/patches/reduce-security-lockdowns-to-avoid-postfix-problems.patch --- xfsprogs-6.13.0/debian/patches/reduce-security-lockdowns-to-avoid-postfix-problems.patch 1970-01-01 01:00:00.000000000 +0100 +++ xfsprogs-6.13.0/debian/patches/reduce-security-lockdowns-to-avoid-postfix-problems.patch 2026-03-01 17:22:10.000000000 +0100 @@ -0,0 +1,133 @@ +From: Bastian Germann <[email protected]> +Date: Mar, 01 2026 16:19:13 +0100 +Bug-Debian: https://bugs.debian.org/1116595 +Subject: reduce security lockdowns to avoid postfix problems + +Apply upstream 50411335572120153cc84d54213cd5ca9dd11b14 to the other +systemd services that people might have problems with. +--- +--- xfsprogs-6.18.0.orig/scrub/xfs_scrub_all.service.in ++++ xfsprogs-6.18.0/scrub/xfs_scrub_all.service.in +@@ -25,61 +25,3 @@ IOSchedulingClass=idle + CPUSchedulingPolicy=idle + CPUAccounting=true + Nice=19 +- +-# No realtime scheduling +-RestrictRealtime=true +- +-# No special privileges, but we still have to run as root so that we can +-# contact the service manager to start the sub-units. +-CapabilityBoundingSet= +-NoNewPrivileges=true +-RestrictSUIDSGID=true +- +-# Make the entire filesystem readonly except for the media scan stamp file +-# directory. We don't want to hide anything because we need to find all +-# mounted XFS filesystems in the host. +-ProtectSystem=strict +-ProtectHome=read-only +-PrivateTmp=false +-BindPaths=@pkg_state_dir@ +- +-# No network access except to the systemd control socket +-PrivateNetwork=true +-ProtectHostname=true +-RestrictAddressFamilies=AF_UNIX +-IPAddressDeny=any +- +-# Don't let the program mess with the kernel configuration at all +-ProtectKernelLogs=true +-ProtectKernelModules=true +-ProtectKernelTunables=true +-ProtectControlGroups=true +-ProtectProc=invisible +-RestrictNamespaces=true +- +-# Hide everything in /proc, even /proc/mounts +-ProcSubset=pid +- +-# Only allow the default personality Linux +-LockPersonality=true +- +-# No writable memory pages +-MemoryDenyWriteExecute=true +- +-# Don't let our mounts leak out to the host +-PrivateMounts=true +- +-# Restrict system calls to the native arch and only enough to get things going +-SystemCallArchitectures=native +-SystemCallFilter=@system-service +-SystemCallFilter=~@privileged +-SystemCallFilter=~@resources +-SystemCallFilter=~@mount +- +-# Media scan stamp file shouldn't be readable by regular users +-UMask=0077 +- +-# lsblk ignores mountpoints if it can't find the device files, so we cannot +-# hide them +-#ProtectClock=true +-#PrivateDevices=true +--- xfsprogs-6.18.0.orig/scrub/xfs_scrub_all_fail.service.in ++++ xfsprogs-6.18.0/scrub/xfs_scrub_all_fail.service.in +@@ -14,58 +14,3 @@ ExecStart=@pkg_libexec_dir@/xfs_scrub_fa + User=mail + Group=mail + SupplementaryGroups=systemd-journal +- +-# No realtime scheduling +-RestrictRealtime=true +- +-# Make the entire filesystem readonly and /home inaccessible. +-ProtectSystem=full +-ProtectHome=yes +-PrivateTmp=true +-RestrictSUIDSGID=true +- +-# Emailing reports requires network access, but not the ability to change the +-# hostname. +-ProtectHostname=true +- +-# Don't let the program mess with the kernel configuration at all +-ProtectKernelLogs=true +-ProtectKernelModules=true +-ProtectKernelTunables=true +-ProtectControlGroups=true +-ProtectProc=invisible +-RestrictNamespaces=true +- +-# Can't hide /proc because journalctl needs it to find various pieces of log +-# information +-#ProcSubset=pid +- +-# Only allow the default personality Linux +-LockPersonality=true +- +-# No writable memory pages +-MemoryDenyWriteExecute=true +- +-# Don't let our mounts leak out to the host +-PrivateMounts=true +- +-# Restrict system calls to the native arch and only enough to get things going +-SystemCallArchitectures=native +-SystemCallFilter=@system-service +-SystemCallFilter=~@privileged +-SystemCallFilter=~@resources +-SystemCallFilter=~@mount +- +-# xfs_scrub needs these privileges to run, and no others +-CapabilityBoundingSet= +-NoNewPrivileges=true +- +-# Failure reporting shouldn't create world-readable files +-UMask=0077 +- +-# Clean up any IPC objects when this unit stops +-RemoveIPC=true +- +-# No access to hardware device files +-PrivateDevices=true +-ProtectClock=true diff -Nru xfsprogs-6.13.0/debian/patches/series xfsprogs-6.13.0/debian/patches/series --- xfsprogs-6.13.0/debian/patches/series 2025-02-23 15:20:24.000000000 +0100 +++ xfsprogs-6.13.0/debian/patches/series 2026-03-04 12:27:53.000000000 +0100 @@ -1 +1,3 @@ mkfs-Correct-filesize-declaration.patch +xfs_scrub_fail-reduce-security-lockdowns.patch +reduce-security-lockdowns-to-avoid-postfix-problems.patch diff -Nru xfsprogs-6.13.0/debian/patches/xfs_scrub_fail-reduce-security-lockdowns.patch xfsprogs-6.13.0/debian/patches/xfs_scrub_fail-reduce-security-lockdowns.patch --- xfsprogs-6.13.0/debian/patches/xfs_scrub_fail-reduce-security-lockdowns.patch 1970-01-01 01:00:00.000000000 +0100 +++ xfsprogs-6.13.0/debian/patches/xfs_scrub_fail-reduce-security-lockdowns.patch 2026-03-04 12:26:44.000000000 +0100 @@ -0,0 +1,101 @@ +From 15fd6fc686d5ce7640e46d44f6fa018413ce1b64 Mon Sep 17 00:00:00 2001 +From: "Darrick J. Wong" <[email protected]> +Date: Mon, 13 Oct 2025 16:34:24 -0700 +Subject: [PATCH] xfs_scrub_fail: reduce security lockdowns to avoid postfix + problems + +Iustin Pop reports that the xfs_scrub_fail service fails to email +problem reports on Debian when postfix is installed. This is apparently +due to several factors: + +1. postfix's sendmail wrapper calling postdrop directly, +2. postdrop requiring the ability to write to the postdrop group, +3. lockdown preventing the xfs_scrub_fail@ service to have postdrop in + the supplemental group list or the ability to run setgid programs + +Item (3) could be solved by adding the whole service to the postdrop +group via SupplementalGroups=, but that will fail if postfix is not +installed and hence there is no postdrop group. + +It could also be solved by forcing msmtp to be installed, bind mounting +msmtp into the service container, and injecting a config file that +instructs msmtp to connect to port 25, but that in turn isn't compatible +with systems not configured to allow an smtp server to listen on ::1. + +So we'll go with the less restrictive approach that e2scrub_fail@ does, +which is to say that we just turn off all the sandboxing. :( :( + +Reported-by: [email protected] +Cc: [email protected] # v6.10.0 +Fixes: 9042fcc08eed6a ("xfs_scrub_fail: tighten up the security on the background systemd service") +Signed-off-by: Darrick J. Wong <[email protected]> +Reviewed-by: Andrey Albershteyn <[email protected]> +--- + scrub/[email protected] | 57 ++------------------------------ + 1 file changed, 3 insertions(+), 54 deletions(-) + +diff --git a/scrub/[email protected] b/scrub/[email protected] +index 16077888..1e205768 100644 +--- a/scrub/[email protected] ++++ b/scrub/[email protected] +@@ -19,57 +19,6 @@ SupplementaryGroups=systemd-journal + # can control resource usage. + Slice=system-xfs_scrub.slice + +-# No realtime scheduling +-RestrictRealtime=true +- +-# Make the entire filesystem readonly and /home inaccessible. +-ProtectSystem=full +-ProtectHome=yes +-PrivateTmp=true +-RestrictSUIDSGID=true +- +-# Emailing reports requires network access, but not the ability to change the +-# hostname. +-ProtectHostname=true +- +-# Don't let the program mess with the kernel configuration at all +-ProtectKernelLogs=true +-ProtectKernelModules=true +-ProtectKernelTunables=true +-ProtectControlGroups=true +-ProtectProc=invisible +-RestrictNamespaces=true +- +-# Can't hide /proc because journalctl needs it to find various pieces of log +-# information +-#ProcSubset=pid +- +-# Only allow the default personality Linux +-LockPersonality=true +- +-# No writable memory pages +-MemoryDenyWriteExecute=true +- +-# Don't let our mounts leak out to the host +-PrivateMounts=true +- +-# Restrict system calls to the native arch and only enough to get things going +-SystemCallArchitectures=native +-SystemCallFilter=@system-service +-SystemCallFilter=~@privileged +-SystemCallFilter=~@resources +-SystemCallFilter=~@mount +- +-# xfs_scrub needs these privileges to run, and no others +-CapabilityBoundingSet= +-NoNewPrivileges=true +- +-# Failure reporting shouldn't create world-readable files +-UMask=0077 +- +-# Clean up any IPC objects when this unit stops +-RemoveIPC=true +- +-# No access to hardware device files +-PrivateDevices=true +-ProtectClock=true ++# No further restrictions because some installations may have MTAs such as ++# postfix, which require the ability to run setgid programs and other ++# foolishness.

