Commit Graph

23993 Commits

Author SHA1 Message Date
Emin Tufan Çetin
e9fc174fd6 Update Turkish translation 2022-03-23 08:12:25 +00:00
Philip Withnall
b06a9300c8 2.70.5
Signed-off-by: Philip Withnall <pwithnall@endlessos.org>
2.70.5
2022-03-17 13:58:37 +00:00
Simon McVittie
176df2ab7a Merge branch 'backport-2554-timezone-offset-glib-2-70' into 'glib-2-70'
Backport !2554 “gtimezone: Fix assertion failure when called with a huge offset” to glib-2-70

See merge request GNOME/glib!2555
2022-03-16 17:22:49 +00:00
Philip Withnall
0b63312775 gtimezone: Fix assertion failure when called with a huge offset
This looks like a regression from commit 3356934db5, but prior to that
commit there was always an assertion failure when calling
`g_time_zone_new_offset()` with an offset which is too large (such as 44
hours), ever since the function was added in commit cf24867b93.

It would be ideal if we could return a `NULL` timezone to indicate the
error, but that’s not part of the API for `g_time_zone_new_offset()`, so
we have to go with the dated and not-ideal approach of returning the UTC
timezone and letting the caller figure it out.

Another potential approach would be to reduce the `offset` modulo 24
hours. This makes the error less easily detectable than if returning
UTC, though, and still returns an invalid result: `+44:00` is not the
same timezone as `+20:00` (it’s one day further ahead).

Add a unit test.

Signed-off-by: Philip Withnall <pwithnall@endlessos.org>

Fixes: #2620
2022-03-16 16:49:27 +00:00
Balázs Úr
1498bb4524 Update Hungarian translation 2022-03-10 19:44:29 +00:00
Aurimas Černius
1f464789e4 Updated Lithuanian translation 2022-03-07 18:06:11 +02:00
Sebastian Dröge
3c482d6b58 Merge branch 'backport-2451-canon-fix-glib-2-70' into 'glib-2-70'
Backport !2451 “glib: fix buffer overflow in g_canonicalize_filename()” to glib-2-70

See merge request GNOME/glib!2537
2022-03-07 09:10:22 +00:00
Marc-André Lureau
6c60b12b3e glib: fix buffer overflow in g_canonicalize_filename()
The output pointer must not go past the ending \0.

warning: HEAP[testglib.exe]:
warning: Heap block at 0000011EA35745A0 modified at 0000011EA35745BF past requested size of f

Fixes commit 9a30a495ec "gfileutils: Improve performance of g_canonicalize_filename()"

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2022-03-04 18:42:16 +00:00
Мирослав Николић
ca5a62a333 Update Serbian translation 2022-03-03 04:34:34 +00:00
Emin Tufan Çetin
97fbb227af Update Turkish translation 2022-02-22 17:37:59 +00:00
Christian Kirbach
6fb1aaccbd Update German translation 2022-02-19 13:48:10 +00:00
Daniel Șerbănescu
9df5e573a2 Update Romanian translation 2022-02-19 13:42:16 +00:00
Jordi Mas i Hernandez
7c8bb47fcf Update Catalan translation 2022-02-12 20:18:38 +00:00
Philip Withnall
2348f764f3 2.70.4
Signed-off-by: Philip Withnall <pwithnall@endlessos.org>
2.70.4
2022-02-11 12:26:18 +00:00
Kukuh Syafaat
47aba05acb Update Indonesian translation 2022-02-10 03:10:01 +00:00
Marek Černocký
52cae355fa Updated Czech translation 2022-02-09 20:49:34 +01:00
Daniel Mustieles
1fb808553d Updated Spanish translation 2022-02-07 13:55:17 +01:00
Charles Monzat
51abef7110 Update French translation 2022-02-06 15:28:39 +00:00
Matej Urbančič
58619b6609 Update Slovenian translation 2022-01-30 20:58:24 +00:00
sicklylife
cd6add1a3c Update Japanese translation 2022-01-30 15:25:02 +00:00
sicklylife
2667381e80 Update Japanese translation 2022-01-30 15:12:46 +00:00
Piotr Drąg
49c377c61f Update Polish translation 2022-01-29 14:08:42 +00:00
Yuri Chornoivan
33e9d70110 Update Ukrainian translation 2022-01-27 14:36:39 +00:00
Simon McVittie
e01a71bf13 Merge branch 'backport-2461-memory-leak-glib-2-70' into 'glib-2-70'
Backport !2461 “Fix memory leak in gio/gdbusauthmechanismsha1.c” to glib-2-70

See merge request GNOME/glib!2462
2022-01-27 12:18:12 +00:00
Loic Le Page
554db5f8ae Fix memory leak in gio/gdbusauthmechanismsha1.c 2022-01-27 11:06:21 +00:00
Aleksandr Melman
2d32f88433 Update Russian translation 2022-01-27 10:50:23 +00:00
Anders Jonsson
4a6bd94d90 Update Swedish translation 2022-01-26 20:27:00 +00:00
Rafael Fontenelle
22e9237d02 Update Brazilian Portuguese translation 2022-01-26 19:22:25 +00:00
Philip Withnall
7049535a06 2.70.3
Signed-off-by: Philip Withnall <pwithnall@endlessos.org>
2.70.3
2022-01-26 14:52:28 +00:00
Hugo Carvalho
a3c6948099 Update Portuguese translation 2022-01-26 14:34:29 +00:00
Philip Withnall
62b800c51e Merge branch 'backport-2454-security-fixes-glib-2-70' into 'glib-2-70'
Backport !2454 gdbusmessage and gvariant fixes to glib-2-70

See merge request GNOME/glib!2455
2022-01-26 14:31:42 +00:00
Sebastian Wilhelmi
48750feaac gdbusmessage: Disallow zero-length elements in arrays
They are not allowed in the specification, and can lead to infinite
loops when parsing.

That’s a security issue if your application is accepting D-Bus messages
from untrusted peers (perhaps in a peer-to-peer connection). It’s not
exploitable when your application is connected to a bus (such as the
system or session buses), as the bus daemons (dbus-daemon or
dbus-broker) filter out such broken messages and don’t forward them.

Arrays of zero-length elements are disallowed in the D-Bus
specification: https://dbus.freedesktop.org/doc/dbus-specification.html#container-types

oss-fuzz#41428, #41435
Fixes: #2557
2022-01-26 13:10:05 +00:00
Sebastian Wilhelmi
0d64ae771e gdbusmessage: Disallow empty structures/tuples in D-Bus messages
They are disallowed in the specification:
https://dbus.freedesktop.org/doc/dbus-specification.html#container-types

Helps: #2557
2022-01-26 13:10:05 +00:00
Sebastian Wilhelmi
1ce8a0abb7 gvariant-serialiser: Prevent unbounded recursion in is_normal()
This fixes a bug in 7c4e6e9fbe.

The original approach in that commit accidentally only checked the depth
at the leaf nodes in the variant tree, whereas actually the depth should
be checked before recursing to avoid stack overflow.

It neglected to consider that `g_variant_serialised_is_normal()` would
be recursed into by some of the `DISPATCH(_is_normal)` cases. When that
happened, the depth check was after the recursion so couldn’t prevent a
stack overflow.

Fixes: #2572
2022-01-26 13:10:05 +00:00
Kukuh Syafaat
3fb62e4984 Update Indonesian translation 2022-01-26 01:48:57 +00:00
Milo Casagrande
5d5d5b04ea Update Italian translation 2022-01-23 14:07:16 +00:00
Yuri Chornoivan
a1a754a872 Update Ukrainian translation 2022-01-22 16:29:40 +00:00
Piotr Drąg
7e1048d450 Update Polish translation 2022-01-22 10:46:23 +00:00
Anders Jonsson
4b2d9f509f Update Swedish translation 2022-01-22 10:30:57 +00:00
Daniel Mustieles
0c000b97f0 Updated Spanish translation 2022-01-21 10:26:53 +01:00
Hugo Carvalho
9e1fabd601 Update Portuguese translation 2022-01-19 15:31:17 +00:00
Sebastian Dröge
2bc689268a Merge branch 'backport-2435-spawn-close-range-glib-2-70' into 'glib-2-70'
Backport !2435 “gspawn: Report errors with closing file descriptors between fork/exec” to glib-2-70

See merge request GNOME/glib!2444
2022-01-19 13:46:37 +00:00
Philip Withnall
9dabc7c5ac gspawn: Report errors with closing file descriptors between fork/exec
If a seccomp policy is set up incorrectly so that it returns `EPERM` for
`close_range()` rather than `ENOSYS` due to it not being recognised, no
error would previously be reported from GLib, but some file descriptors
wouldn’t be closed, and that would cause a hung zombie process. The
zombie process would be waiting for one half of a socket to be closed.

Fix that by correctly propagating errors from `close_range()` back to the
parent process so they can be reported correctly.

Distributions which aren’t yet carrying the Docker fix to correctly
return `ENOSYS` from unrecognised syscalls may want to temporarily carry
an additional patch to fall back to `safe_fdwalk()` if `close_range()`
fails with `EPERM`. This change will not be accepted upstream as `EPERM`
is not the right error for `close_range()` to be returning.

Signed-off-by: Philip Withnall <pwithnall@endlessos.org>

Fixes: #2580
2022-01-19 13:12:52 +00:00
Sebastian Dröge
dfc43aedec Merge branch 'backport-2425-btrfs-optimisation-glib-2-70' into 'glib-2-70'
Backport !2425 “gfileutils: Remove outdated BTRFS fsync optimization from set_contents” to glib-2-70

See merge request GNOME/glib!2437
2022-01-18 08:51:32 +00:00
Sebastian Keller
fa4b0e431e gfileutils: Remove outdated BTRFS fsync optimization from set_contents
This code was skipping fsync on BTRFS because of an old guarantee about
the overwrite-by-rename behavior that no longer holds true. This has
been confirmed by the BTRFS developers to no longer be guaranteed since
Kernel 3.17 (August 2014), but it was guaranteed when this optimization
was first introduced in 2010.

This could result in empty files after crashes in applications using
g_file_set_contents(). Most prominently this might have been the cause
of dconf settings getting lost on BTRFS after crashes due to the
frequency with which such writes can happen in dconf.

See: https://gitlab.gnome.org/GNOME/dconf/-/issues/73
2022-01-17 20:08:54 +00:00
Marek Černocký
9404a7b5d3 Updated Czech translation 2022-01-14 12:03:42 +01:00
Sebastian Dröge
e1bbfdbcd5 Merge branch 'backport-2412-paramspec-annotation-glib-2-70' into 'glib-2-70'
Backport !2412 “paramspec: fix unref annotation” to glib-2-70

See merge request GNOME/glib!2415
2022-01-05 13:45:24 +00:00
Bilal Elmoussaoui
2812798347 paramspec: fix unref annotation 2022-01-05 13:13:03 +00:00
Мирослав Николић
12d77beb94 Update Serbian translation 2021-12-29 17:57:25 +00:00
Matej Urbančič
19badb2434 Update Slovenian translation 2021-12-19 21:27:53 +00:00