Page MenuHomePhabricator

CVE CVE-2021-33910 (systemd crash) on Cloud VPS
Closed, ResolvedPublic

Description

https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt

We need to check whether or not unattended upgrades are fixing this automatically.

241-7~deb10u8 is the fixed version for buster,
232-25+deb9u13 is fixed version in stretch

A simple upgrade should resolve the issue once packages are available:

# apt-get install systemd systemd-sysv udev libudev1 libsystemd0 libpam-systemd libnss-systemd

Event Timeline

Andrew triaged this task as Unbreak Now! priority.Jul 20 2021, 1:31 PM
Andrew updated the task description. (Show Details)
Andrew updated the task description. (Show Details)

I've confirmed that newly-built VMs get the latest version of systemd, thanks to cloud-init doing an upgrade at build time.

Rolling out manually on Toolforge k8s nodes (buster and somewhat user-accessible):

taavi@tools-clushmaster-02:~ $ clush -w "@k8s" "sudo DEBIAN_FRONTEND=noninteractive apt-get -q -y --assume-no -o DPkg::Options::="--force-confdef" -o DPkg::Options::="--force-confold" install systemd systemd-sysv udev libudev1 libsystemd0 libpam-systemd libnss-systemd"

Also deployed by hand on the Buster bastions.

root@abogott-puppetclient:~# lsb_release -a
No LSB modules are available.
Distributor ID:	Debian
Description:	Debian GNU/Linux 10 (buster)
Release:	10
Codename:	buster
root@abogott-puppetclient:~# dpkg --list | grep systemd
ii  dbus-user-session                    1.12.20-0+deb10u1                 amd64        simple interprocess messaging system (systemd --user integration)
ii  libnss-systemd:amd64                 241-7~deb10u7                     amd64        nss module providing dynamic user and group name resolution
ii  libpam-systemd:amd64                 241-7~deb10u7                     amd64        system and service manager - PAM module
ii  libsystemd0:amd64                    241-7~deb10u7                     amd64        systemd utility library
ii  systemd                              241-7~deb10u7                     amd64        system and service manager
ii  systemd-sysv                         241-7~deb10u7                     amd64        system and service manager - SysV links

But after a forced run of unattended-upgrades:

root@abogott-puppetclient:~# dpkg --list | grep systemd
ii  dbus-user-session                    1.12.20-0+deb10u1                 amd64        simple interprocess messaging system (systemd --user integration)
ii  libnss-systemd:amd64                 241-7~deb10u8                     amd64        nss module providing dynamic user and group name resolution
ii  libpam-systemd:amd64                 241-7~deb10u8                     amd64        system and service manager - PAM module
ii  libsystemd0:amd64                    241-7~deb10u8                     amd64        systemd utility library
ii  systemd                              241-7~deb10u8                     amd64        system and service manager
ii  systemd-sysv                         241-7~deb10u8

So probably we don't need to do anything for this but let's check back in 24 hours.

Mentioned in SAL (#wikimedia-cloud) [2021-07-20T18:42:35Z] <majavah> deploying systemd security tools on toolforge public stretch machines T287004

taavi lowered the priority of this task from Unbreak Now! to High.Jul 21 2021, 8:48 AM

Unattended-upgrades seems to have done its job, checked tools and deployment-prep and everything had updated except the bastions which have backported systemd and a subtask

Should we close this or are there still toolforge edge cases that require package building?

Bstorm subscribed.

That should have been the only edge case. We didn't mess with systemd elsewhere.