[Bug 1846367] Re: udev /dev/null incorrect permissions after package auto upgrades

Dan Streetman 1846367 at bugs.launchpad.net
Wed Jun 30 22:34:33 UTC 2021


please reopen if this is still an issue

** Changed in: systemd (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1846367

Title:
  udev /dev/null incorrect permissions after package auto upgrades

Status in systemd package in Ubuntu:
  Invalid

Bug description:
  I've been attempting to determine root cause of this problem for
  months.

  Symptom is group/other permissions being dropped from all /dev/*
  files.

  This only occurs on some machines, so some machine udev updates work,
  some machines quietly fail.

  Looks like the problem relates to...

  1) APT /etc/apt/apt.conf.d/10periodic APT::Periodic::Update-Package-
  Lists == 1, which triggers auto upgrades for critical packages.

  2) This triggers the udev package run as an unattended/automatic
  upgrade.

  3) When udev package updates, /var/log/dpkg.log shows no errors.

  4) /dev/* files have group/other permissions stripped.

  5) LXD containers become unstable, as containers /dev points to
  machine /dev.

  Temp fix is change /etc/apt/apt.conf.d/10periodic - APT::Periodic
  ::Update-Package-Lists == 0 to disable all unattended upgrades.

  Someone let me know where I can find APT/DPKG logs detailing exactly
  what post install hook scripts run for udev, so I can look for errors.

  Or if log verbosity has to be increased for this level of logging, let
  me know how to increase verbosity, so next time udev updates, I can
  provide logging detail sufficient to generate a fix for this problem.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1846367/+subscriptions



More information about the foundations-bugs mailing list