Debian Patches

Status for schroot/1.6.10-12+deb11u1

Patch Description Author Forwarded Bugs Origin Last update
cross.patch no
reproducible-build.patch Make the documentation build reproducibly Chris Lamb <lamby@debian.org> no 2020-09-24
Add-support-for-more-compression-formats.patch Add support for more compression formats Aurelien Jarno <aurelien@aurel32.net> no upstream, https://github.com/codelibre-net/schroot/commit/22e04451800756b59f6e47b092ed952bc0dc995f 2014-11-13
Add-SESSION_SOURCE-and-CHROOT_SESSION_SOURCE.patch Add SESSION_SOURCE and CHROOT_SESSION_SOURCE =?utf-8?q?Rapha=C3=ABl_Hertzog?= <hertzog@debian.org> no debian upstream 2015-08-16
10mount-Move-mount-directory-to-var-run.patch 10mount: Move mount directory to /var/run
Note that this patch merges multiple upstream commits.
=?utf-8?q?Rapha=C3=ABl_Hertzog?= <hertzog@debian.org> no debian upstream 2015-08-16
Support-union-mounts-with-overlay-as-in-Linux-4.0.patch Support union mounts with overlay, as in Linux 4.0 Felipe Sateler <ffsateler@debian.org> yes upstream 2015-05-23
GCC5-fixes-on-regexes.patch GCC5 fixes on regexes =?utf-8?q?Rapha=C3=ABl_Hertzog?= <hertzog@debian.org> yes upstream upstream 2015-08-16
schroot-mount-make-bind-mounts-private.patch [PATCH] schroot-mount: Make bind mounts use private mount propagation
When creating a bind mount, on a Linux system, mark the target as
private. When creating a recursive bind mount, on a Linux system, mark
the target as recursively private.

This change fixes issues around shared mount points being bind mounted
into a schroot and then when the schroot session is tore down, the mount
point being unmounted in both the schroot and in the host environment.

For example, if the schroot fstab file contains the following line:

/home /home none rw,rbind 0 0

A user's home directory mounted at /home/$USER is unmounted in both the
schroot and host when the schroot sessions is ended without this change.
Tyler Hicks <tyhicks@canonical.com> no 2015-10-27
schroot-mount-resolve-mount-destinations-while-chrooted.patch [PATCH] schroot-mount: Resolve mount destinations while chrooted
The schroot-mount binary was attempting to use realpath(3) from outside
of the chroot to resolve mount destination paths inside of the chroot.
It would then take the resolved path and prepend it with the path to the
chroot in an attempt to enforce that symlink resolution will always end
up inside of the chroot.

One example of why this approach isn't sufficient is that when
/<chroot>/dev/shm/ is the mount destination but it is a symlink to
/run/shm and the host's /run/shm is a symlink to /dev/shm. The resolved
path will end up being /<chroot>/dev/shm/ and, due to mount following
symlinks, the host's /dev/shm will be mounted over.

To fix the path resolution issue, this patch first resolves the path to
the chroot base path, then forks and calls chroot(2) on that path, then
resolves the path to the mount destination inside the chroot. Finally,
the resolved chroot base path and the resolved mount destination path
are combined to create the fully resolved path used for mounting.
Tyler Hicks <tyhicks@canonical.com> no debian 2015-07-28
fix-test-suite-with-usrmerge.patch Fix test suite when /bin is a symlink to /usr/bin Raphaël Hertzog <hertzog@debian.org> no 2017-01-09
Unmount-everything-that-we-can-instead-of-giving-up.patch [PATCH] Unmount everything that we can, instead of giving up at the first failure Dima Kogan <dima@secretsauce.net> no 2016-07-02
fix-killprocs.patch Fix logic in 15killprocs The code that tried to identify processes running in a chroot
was failing when the chroot path contained a symlink (/var/run)
since the kernel reports a canonicalized name.
.
Thanks to Christoph Biedl <debian.axhn@manchmal.in-ulm.de> for the
analysis.
Raphaël Hertzog <hertzog@debian.org> no debian 2017-01-09
fix-bash-completion.patch Fix bash completion Raphaël Hertzog <hertzog@debian.org> yes debian upstream 2017-06-06
fix_typos_in_schroot_manpage.patch schroot: [INTL:de] Updated German PO translation
There's a typo (marked with »FIXME« in the po file).

Date: Wed, 26 Nov 2014 15:26:13 +0000
From: Roger Leigh <rleigh@codelibre.net>

Many thanks, much appreciated!

I've committed this including the typo fix--thanks for pointing it out.

===================================================================
Chris Leick <c.leick@vollbio.de> no debian upstream 2014-11-25
update_czech_schroot_translation.patch [l10n] Updated Czech translation of schroot
in attachment there is updated Czech (cs.po) translation of schroot.

===================================================================
Miroslav Kure <kurem@upcase.inf.upol.cz> no debian upstream 2014-11-29
update_french_schroot_manpage_translation_2018.patch =================================================================== no
update_german_schroot_manpage_translation_2018.patch =================================================================== no
zfs-snapshot-support.patch add support for a zfs-snapshot backend.
===================================================================
Steve Langasek <vorlon@debian.org> no debian 2020-01-04
binfmt-parent-dir.patch schroot-setup: create parent directory for binfmt interpreter (#983087)
Currently schroot-setu (/etc/setup.d/15binfmt) mounts foreign binfmt
interpreter from host into the chroot. The problem is that the interpreter
could be in a directory which is not present in the chroot being created.
Ensure the parent directory exists before trying to bind-mount the
interpreter.

For qemu-based foreign chroots this whole thing isn't necessary with
the introduction of the F binfmt-misc flag (fix_binary), but it wont
hurt anyway. Also, the current method only works for binfmt-support
package and not for other ways to register binfmt-misc interpreters,
such as systemd way or direct/manual registration.

diff --git a/etc/setup.d/15binfmt b/etc/setup.d/15binfmt
index ad1776b2..ccd3776d 100644
Michael Tokarev <mjt@tls.msk.ru> no debian 2021-02-28
1660584747.reschroot-1.6.12-2-g6f7166a2.have-stricter-rules-on-chroot-names-cve-2022-2787.patch Have stricter rules on chroot names [CVE-2022-2787]
Commit 8c1c9370 ("sbuild::chroot_config: Replace is_valid_filename with
is_valid_sessionname") introduced a very broad rule on the name of a
chroot or session name. As it turned out, some of the allowed characters
would break schroot's internal state, or would make the setup croak in
various backends.

This change limits the set of allowed characters to what seems to be
safe: Letters and digits, and in all but the first place, the characters
dot ('.'), dash ('-'), and underscore ('_').

Special thanks to Julian Gilbey <jdg@debian.org> for reporting the issue
and providing additional insights about the severity.
no release/reschroot-1.6.12-2-g6f7166a2 2022-08-15

All known versions for source package 'schroot'

Links