This change has now been approved by the EPEL Steering Committee and
requested to be pushed to stable. I expect it to be in stable sometime
tomorrow.

Dave

On Wed, Apr 26, 2023 at 01:07:32PM -0500, Dave Dykstra wrote:
> The apptainer-suid package version 1.1.8 now in epel-testing has an
> incompatible change because of a security vulnerability.  The change is
> that a new option "allow setuid-mount extfs" was added which defaults to
> no, preventing ordinary users from mounting ext3 filesystems in
> setuid-root mode.  Those filesystems are used by a subset of users
> primarily for the overlay feature which adds changes on top of a base
> container image.  If unprivileged user namespaces are enabled, users
> will be able to still mount ext3 filesystems by using the "-u/--userns"
> option or if the apptainer-suid package is removed.  If system
> administrators review the vulnerability description at
>   
> https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg
> and decide they still want to allow setuid-root access to this feature,
> they can enable it by setting "allow setuid-mount extfs = yes" in
> /etc/apptainer/apptainer.conf.
> 
> This package will not be promoted to the epel repository for at least
> two weeks, pending approval by the EPEL Steering Committee according to
> the EPEL incompatible change policy.
> 
> Apptainer 1.1.8 release notes are at
>     https://github.com/apptainer/apptainer/releases/tag/v1.1.8
> 
> Dave
_______________________________________________
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to