Commit Graph

401 Commits

Author SHA256 Message Date
Dominique Leuenberger
5cfcf1f7a8 Expedited checkin of diffutils -> cmp migration
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=180
2023-11-17 14:11:48 +00:00
Ana Guerrero
c4836eae87 Accepting request 1112496 from Base:System
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1112496
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=179
2023-09-22 19:47:07 +00:00
a2330cfb84 - update to 1.14.10:
* Avoid a dbus-daemon crash if re-creating a connection's policy
    fails. If it isn't possible to re-create its policy (for
    example if it belongs to a user account that has been deleted
    or if the Name Service Switch is broken, on a system not
    supporting SO_PEERGROUPS), we now log a warning, continue to
    use its current policy, and continue to reload other
    connections' policies.
  * If getting the groups from a user ID fails, report the error
    correctly, instead of logging "(null)"
  * Return the primary group ID in GetConnectionCredentials()'
    UnixGroupIDs field for processes with a valid-but-empty
    supplementary group list
- Disable asserts (bsc#1087072)
- set runstatedir correctly
- avoid listing cmake directory - owned by cmake package
- Use sysusers.d to create messagebus user

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=338
2023-09-13 08:46:45 +00:00
Dominique Leuenberger
bef8189712 Accepting request 1092691 from Base:System
- update to 1.14.8 (bsc#1212126, CVE-2023-34969):
  * Denial-of-service fixes:
  * Fix an assertion failure in dbus-daemon when a privileged
    Monitoring connection (dbus-monitor, busctl monitor, gdbus
    monitor or similar) is active, and a message from the bus
    driver cannot be delivered to a client connection due to
    <deny> rules or outgoing message quota. This
    is a denial of service if triggered maliciously by a local
    attacker.
  * Fix compilation on compilers not supporting __FUNCTION__
  * Fix some memory leaks on out-of-memory conditions
  * Fix syntax of a code sample in dbus-api-design

OBS-URL: https://build.opensuse.org/request/show/1092691
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=178
2023-06-14 14:28:56 +00:00
dcd95237cf - update to 1.14.8 (bsc#1212126, CVE-2023-34969):
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=336
2023-06-12 21:17:59 +00:00
3aa97ec44a - update to 1.14.8:
* Denial-of-service fixes:
  * Fix an assertion failure in dbus-daemon when a privileged
    Monitoring connection (dbus-monitor, busctl monitor, gdbus
    monitor or similar) is active, and a message from the bus
    driver cannot be delivered to a client connection due to
    <deny> rules or outgoing message quota. This
    is a denial of service if triggered maliciously by a local
    attacker.
  * Fix compilation on compilers not supporting __FUNCTION__
  * Fix some memory leaks on out-of-memory conditions
  * Fix syntax of a code sample in dbus-api-design

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=335
2023-06-12 21:16:15 +00:00
Dominique Leuenberger
7af63810f2 Accepting request 1067484 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1067484
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=177
2023-03-02 22:02:00 +00:00
b54e0829fa Accepting request 1067438 from home:gmbr3:Active
- Move %tmpfiles_create to %post otherwise the file won't exist
  since it is now located in the correct package

OBS-URL: https://build.opensuse.org/request/show/1067438
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=333
2023-02-23 23:38:21 +00:00
b56bd0fa36 Accepting request 1066638 from home:gmbr3:Active
- Packaging changes:
  * Move missed scriptlets and links for dbus.socket to common
  * Move sysusers and tmpfiles scriptlets, and ghost files to
    common
  * Move dbus-launch man page to correct package

OBS-URL: https://build.opensuse.org/request/show/1066638
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=332
2023-02-23 14:02:44 +00:00
Dominique Leuenberger
9109799af2 Accepting request 1064302 from Base:System
fix multibuild

OBS-URL: https://build.opensuse.org/request/show/1064302
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=176
2023-02-11 20:55:59 +00:00
Fridrich Strba
fabec3cb1f OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=330 2023-02-10 16:31:13 +00:00
Fridrich Strba
6fc53b808d Accepting request 1064293 from home:dimstar:Factory
- Fix multibuikd: do not mention main flavor in multibuild, as it
  is implicit built.

    dbus-daemon or other users of DBusServer prior to
- update to 1.14.4 (bsc#1204111, CVE-2022-42010,

OBS-URL: https://build.opensuse.org/request/show/1064293
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=329
2023-02-10 16:29:55 +00:00
6a83c1aecf - update to 1.14.6:
* Fix an incorrect assertion that could be used to crash
    dbus-daemon or other users of DBusServer prior to 
    authentication, if libdbus was compiled with assertions
    enabled.
    We recommend that production builds of dbus, for example in
    OS distributions, should be compiled with checks but
    without assertions.
  * When connected to a dbus-broker, stop dbus-monitor from
    incorrectly replying to Peer method calls that were sent to the
    dbus-broker with a NULL destination
  * Fix out-of-bounds varargs read in the dbus-daemon's config-
    parser.  This is not attacker-triggerable and appears to be
    harmless in practice, but is technically undefined behaviour
    and is detected as such by AddressSanitizer.
  * Avoid a data race in multi-threaded use of DBusCounter
  * Fix a crash with some glibc versions when non-auditable
    SELinux events are logged (dbus!386, Jeremi Piotrowski)
  * If dbus_message_demarshal() runs out of memory while
    validating a message, report it as NoMemory rather than
    InvalidArgs (dbus#420, Simon McVittie)
  * Use C11 _Alignof if available, for better standards-
    compliance
  * Stop including an outdated copy of pkg.m4 in the git tree
  * Documentation:
  * Fix the test-apparmor-activation test after dbus#416
  * Internal changes:
  * Fix CI builds with recent git versions (dbus#447, Simon
    McVittie)
- switch to using multibuild

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=328
2023-02-09 17:09:45 +00:00
Dominique Leuenberger
97c139473e Accepting request 1031295 from Base:System
- update to 1.14.4 (bsc#1204111, CVE-2022-42010, 
                    bsc#1204112, CVE-2022-42011,
                    bsc#1204113, CVE-2022-42012):
  This is a security update for the dbus 1.14.x stable branch, fixing
  denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying
  security hardening (dbus#416).
  Behaviour changes:
  * On Linux, dbus-daemon and other uses of DBusServer now create a
     path-based Unix socket, unix:path=..., when asked to listen on a
     unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to
     unix:dir=... on all platforms.
     Previous versions would have created an abstract socket, unix:abstract=...,
     in this situation.
     This change primarily affects the well-known session bus when run via
     dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring
     dbus with --enable-user-session and running it on a systemd system,
     already used path-based Unix sockets and is unaffected by this change.
     This behaviour change prevents a sandbox escape via the session bus socket
     in sandboxing frameworks that can share the network namespace with the host
     system, such as Flatpak.
     This change might cause a regression in situations where the abstract socket
     is intentionally shared between the host system and a chroot or container,
     such as some use-cases of schroot(1). That regression can be resolved by
     using a bind-mount to share either the D-Bus socket, or the whole /tmp
     directory, with the chroot or container.
     (dbus#416, Simon McVittie)
  * Denial of service fixes:
    - Evgeny Vereshchagin discovered several ways in which an authenticated
      local attacker could cause a crash (denial of service) in
      dbus-daemon --system or a custom DBusServer. In uncommon configurations

OBS-URL: https://build.opensuse.org/request/show/1031295
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=175
2022-10-27 11:54:08 +00:00
a8bd6c1553 - update to 1.14.4 (bsc#1204111, CVE-2022-42010,
bsc#1204112, CVE-2022-42011,
                    bsc#1204113, CVE-2022-42012):
  This is a security update for the dbus 1.14.x stable branch, fixing
  denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying
  security hardening (dbus#416).
  Behaviour changes:
  * On Linux, dbus-daemon and other uses of DBusServer now create a
     path-based Unix socket, unix:path=..., when asked to listen on a
     unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to
     unix:dir=... on all platforms.
     Previous versions would have created an abstract socket, unix:abstract=...,
     in this situation.
     This change primarily affects the well-known session bus when run via
     dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring
     dbus with --enable-user-session and running it on a systemd system,
     already used path-based Unix sockets and is unaffected by this change.
     This behaviour change prevents a sandbox escape via the session bus socket
     in sandboxing frameworks that can share the network namespace with the host
     system, such as Flatpak.
     This change might cause a regression in situations where the abstract socket
     is intentionally shared between the host system and a chroot or container,
     such as some use-cases of schroot(1). That regression can be resolved by
     using a bind-mount to share either the D-Bus socket, or the whole /tmp
     directory, with the chroot or container.
     (dbus#416, Simon McVittie)
  * Denial of service fixes:
    - Evgeny Vereshchagin discovered several ways in which an authenticated
      local attacker could cause a crash (denial of service) in
      dbus-daemon --system or a custom DBusServer. In uncommon configurations

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=326
2022-10-26 09:05:34 +00:00
Dominique Leuenberger
ab1bfa144e Accepting request 1011186 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1011186
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=174
2022-10-17 12:57:21 +00:00
7cc928f081 Accepting request 1011151 from home:iznogood:branches:Base:System
- Disable asserts in dbus-1-x11.spec and dbus-1-devel-doc.spec too

OBS-URL: https://build.opensuse.org/request/show/1011151
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=324
2022-10-15 23:02:03 +00:00
Dominique Leuenberger
9151565052 Accepting request 1010413 from Base:System
- Disable asserts (bsc#1087072)

OBS-URL: https://build.opensuse.org/request/show/1010413
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=173
2022-10-14 13:40:20 +00:00
6b7a0f88d7 - Disable asserts (bsc#1087072)
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=322
2022-10-13 07:30:23 +00:00
Dominique Leuenberger
69bcb04113 Accepting request 981473 from Base:System
- version provides
- add split provides
- remove unused/obsolete pre_checkin.sh

- The great dbus package split of 22, in preperation for replacing
  dbus-daemon with dbus-broker currently there is no functional
  difference that will change later, this follows a similar setup
  to RedHat and Debian.
  * dbus-daemon is now in its own separate package
  * Create a dbus-1-common package with all the files and config
    that are shared between the dbus-daemon and dbus-broker
    implementations.
  * Create a dbus-1-tools package with the tools eventually we will
    likely want to move to only recommending this package Redhat and
    Debian have both already gone down this path.

OBS-URL: https://build.opensuse.org/request/show/981473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=172
2022-06-12 15:36:52 +00:00
030bfd6f94 - update to 2.23:
* Python now waits on child processes with os.wait()
  * open() call with O_CREAT now passes permissions
  * -Ttext-segment argument on aarch64 passes page size in hex
  * Build system improvements
- add disable-morecore.patch: fix build and working with glibc >= 2.34
- rediff patches

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=320
2022-06-09 09:57:20 +00:00
fc4d97e228 - version provides
- add split provides
- remove unused/obsolete pre_checkin.sh

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=319
2022-06-08 12:36:41 +00:00
f939af0947 Accepting request 979267 from home:simotek:broker
- The great dbus package split of 22, in preperation for replacing
  dbus-daemon with dbus-broker currently there is no functional
  difference that will change later, this follows a similar setup
  to RedHat and Debian.
  * dbus-daemon is now in its own separate package
  * Create a dbus-1-common package with all the files and config
    that are shared between the dbus-daemon and dbus-broker
    implementations.
  * Create a dbus-1-tools package with the tools eventually we will
    likely want to move to only recommending this package Redhat and
    Debian have both already gone down this path.

OBS-URL: https://build.opensuse.org/request/show/979267
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=318
2022-06-08 12:33:33 +00:00
Dominique Leuenberger
ce628c6a80 Accepting request 962877 from Base:System
OBS-URL: https://build.opensuse.org/request/show/962877
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=171
2022-03-19 21:20:29 +00:00
8b9e5e4ae2 Accepting request 962625 from home:Vogtinator:branches:Base:System
- Use --with-x=auto to actually enable X11 integration (boo#1197258,
  workaround https://gitlab.freedesktop.org/dbus/dbus/-/merge_requests/263)

- Drop use of %{with libalternatives}, there's no such bcond defined
  and in many other places it's not optional anyway (boo#1197258)

OBS-URL: https://build.opensuse.org/request/show/962625
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=316
2022-03-18 16:09:03 +00:00
Dominique Leuenberger
63a30f45a2 Accepting request 961966 from Base:System
- set runstatedir correctly

OBS-URL: https://build.opensuse.org/request/show/961966
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=170
2022-03-16 20:30:31 +00:00
e47922d8b1 OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=314 2022-03-15 16:26:11 +00:00
aa2309df38 - set runstatedir correctly
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=313
2022-03-14 10:47:02 +00:00
Dominique Leuenberger
c97c98bd1f Accepting request 960278 from Base:System
OBS-URL: https://build.opensuse.org/request/show/960278
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=169
2022-03-11 20:39:55 +00:00
11f4778ee0 Accepting request 960246 from home:iznogood:branches:Base:System
Resub, no multibuild.

The multibuild with several specs are a valid approch - but fine, I'll remove it.

See https://openbuildservice.org/help/manuals/obs-user-guide/cha.obs.multibuild.html

OBS-URL: https://build.opensuse.org/request/show/960246
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=311
2022-03-08 18:40:09 +00:00
Dominique Leuenberger
46ad4084dc Accepting request 958730 from Base:System
OBS-URL: https://build.opensuse.org/request/show/958730
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=168
2022-03-05 13:43:38 +00:00
dec2cdcef2 Accepting request 958337 from home:iznogood:branches:Base:System
- Update to version 1.12.22:
  + On Linux, when using traditional (non-systemd) service
    activation, don't log warnings about failing to reset OOM score
    adjustment if the process is already more susceptible to the
    OOM killer, as user processes usually are with systemd ≥ 250.
  + On Linux, when using traditional (non-systemd) system bus
    activation, reset the OOM score adjustment to 0 as intended.
    If the system dbus-daemon is protected from the OOM killer,
    this avoids that protection unintentionally being inherited by
    every system service.
  + Avoid malloc() after fork on non-GNU libc.
  + Fix build with clang 13 by using Standard C offsetof where
    available.
  + Fix build of tests on FreeBSD.
  + Make documentation build more reproducible.
  + On Unix, make X11 autolaunch cope with slashes in DISPLAY.
  + Don't try to raise RLIMIT_NOFILE beyond OPEN_MAX on macOS.
  + Fix compilation if embedded tests are enabled but verbose mode
    and stats are both disabled.
  + On Linux, fix a race condition in the integration test for
    transient services.
- Update to version 1.12.22:
  + On Linux, when using traditional (non-systemd) service
    activation, don't log warnings about failing to reset OOM score
    adjustment if the process is already more susceptible to the
    OOM killer, as user processes usually are with systemd ≥ 250.
  + On Linux, when using traditional (non-systemd) system bus
    activation, reset the OOM score adjustment to 0 as intended.
    If the system dbus-daemon is protected from the OOM killer,
    this avoids that protection unintentionally being inherited by
    every system service.
  + Avoid malloc() after fork on non-GNU libc.
  + Fix build with clang 13 by using Standard C offsetof where
    available.
  + Fix build of tests on FreeBSD.
  + Make documentation build more reproducible.
  + On Unix, make X11 autolaunch cope with slashes in DISPLAY.
  + Don't try to raise RLIMIT_NOFILE beyond OPEN_MAX on macOS.
  + Fix compilation if embedded tests are enabled but verbose mode
    and stats are both disabled.
  + On Linux, fix a race condition in the integration test for
    transient services.
- Update to version 1.12.22:
  + On Linux, when using traditional (non-systemd) service
    activation, don't log warnings about failing to reset OOM score
    adjustment if the process is already more susceptible to the
    OOM killer, as user processes usually are with systemd ≥ 250.
  + On Linux, when using traditional (non-systemd) system bus
    activation, reset the OOM score adjustment to 0 as intended.
    If the system dbus-daemon is protected from the OOM killer,
    this avoids that protection unintentionally being inherited by
    every system service.
  + Avoid malloc() after fork on non-GNU libc.
  + Fix build with clang 13 by using Standard C offsetof where
    available.
  + Fix build of tests on FreeBSD.
  + Make documentation build more reproducible.
  + On Unix, make X11 autolaunch cope with slashes in DISPLAY.
  + Don't try to raise RLIMIT_NOFILE beyond OPEN_MAX on macOS.
  + Fix compilation if embedded tests are enabled but verbose mode
    and stats are both disabled.
  + On Linux, fix a race condition in the integration test for
    transient services.

OBS-URL: https://build.opensuse.org/request/show/958337
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=309
2022-03-03 10:22:48 +00:00
Dominique Leuenberger
20f8054c59 Accepting request 933402 from Base:System
OBS-URL: https://build.opensuse.org/request/show/933402
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=167
2021-11-26 23:50:36 +00:00
357aa54d6f Accepting request 932654 from home:gmbr3:Active
sysusers

OBS-URL: https://build.opensuse.org/request/show/932654
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=307
2021-11-24 08:38:49 +00:00
c47005334b Accepting request 921166 from home:schubi2
Added BuildRequires alts for libalternatives.

OBS-URL: https://build.opensuse.org/request/show/921166
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=306
2021-09-23 23:01:29 +00:00
ae009a5b64 Accepting request 919778 from home:schubi2
Fixed spec file regarding removing old update-alternatives entries.

OBS-URL: https://build.opensuse.org/request/show/919778
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=305
2021-09-18 01:10:28 +00:00
cdb990ae1f Accepting request 919476 from home:schubi2
Use libalternatives instead of update-alternatives.

OBS-URL: https://build.opensuse.org/request/show/919476
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=304
2021-09-16 09:31:14 +00:00
Dominique Leuenberger
cdbb1ecf05 Accepting request 883704 from Base:System
- avoid listing cmake directory - owned by cmake package

OBS-URL: https://build.opensuse.org/request/show/883704
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=166
2021-04-12 10:33:41 +00:00
7bd2317d01 - avoid listing cmake directory - owned by cmake package
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=302
2021-04-07 22:36:23 +00:00
Dominique Leuenberger
2381ff0538 Accepting request 876715 from Base:System
OBS-URL: https://build.opensuse.org/request/show/876715
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=165
2021-03-08 14:15:25 +00:00
901a0bf25e Accepting request 876251 from home:lnussel:usrmove
- retire /lib/dbus-1/system-services as it's deprecated

OBS-URL: https://build.opensuse.org/request/show/876251
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=300
2021-03-04 10:58:45 +00:00
Dominique Leuenberger
f9b07f568e Accepting request 850346 from Base:System
OBS-URL: https://build.opensuse.org/request/show/850346
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=164
2020-11-25 18:27:20 +00:00
5f12625bff Accepting request 849587 from home:lnussel:usrmove
- prepare usrmerge (boo#1029961)

OBS-URL: https://build.opensuse.org/request/show/849587
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=298
2020-11-24 01:49:00 +00:00
Dominique Leuenberger
5d9d4a8d16 Accepting request 828602 from Base:System
OBS-URL: https://build.opensuse.org/request/show/828602
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=163
2020-08-28 21:44:51 +00:00
22a5e1447b Accepting request 828587 from home:dancermak:branches:Base:System
Require diffutils in post so that cmp is available

OBS-URL: https://build.opensuse.org/request/show/828587
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=296
2020-08-22 03:47:45 +00:00
Dominique Leuenberger
4c060df29f Accepting request 826904 from Base:System
- Update to 1.12.20
  * On Unix, avoid a use-after-free if two usernames have the same
    numeric uid. In older versions this could lead to a crash (denial of
    service) or other undefined behaviour, possibly including incorrect
    authorization decisions if <policy group=...> is used.
    Like Unix filesystems, D-Bus' model of identity cannot distinguish
    between users of different names with the same numeric uid, so this
    configuration is not advisable on systems where D-Bus will be used.
    Thanks to Daniel Onaca.
    (dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
  * CVE-2020-12049: If a message contains more file descriptors than can
    be sent, close those that did get through before reporting error.
    Previously, a local attacker could cause the system dbus-daemon (or
    another system service with its own DBusServer) to run out of file
    descriptors, by repeatedly connecting to the server and sending fds that
    would get leaked.
    Thanks to Kevin Backhouse of GitHub Security Lab.
    (dbus#294, GHSL-2020-057; Simon McVittie)
  * Fix a crash when the dbus-daemon is terminated while one or more
    monitors are active (dbus#291, dbus!140; Simon McVittie)
  * The dbus-send(1) man page now documents --bus and --peer instead of
    the old --address synonym for --peer, which has been deprecated since
	the introduction of --bus and --peer in 1.7.6
	(fd.o #48816, dbus!115; Chris Morin)
  * Fix a wrong environment variable name in dbus-daemon(1)
    (dbus#275, dbus!122; Mubin, Philip Withnall)
  * Fix formatting of dbus_message_append_args example
	(dbus!126, Felipe Franciosi)
  * Avoid a test failure on Linux when built in a container as uid 0, but

OBS-URL: https://build.opensuse.org/request/show/826904
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=162
2020-08-19 16:44:38 +00:00
d498fb8aa2 - Update to 1.12.20
* On Unix, avoid a use-after-free if two usernames have the same
    numeric uid. In older versions this could lead to a crash (denial of
    service) or other undefined behaviour, possibly including incorrect
    authorization decisions if <policy group=...> is used.
    Like Unix filesystems, D-Bus' model of identity cannot distinguish
    between users of different names with the same numeric uid, so this
    configuration is not advisable on systems where D-Bus will be used.
    Thanks to Daniel Onaca.
    (dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
  * CVE-2020-12049: If a message contains more file descriptors than can
    be sent, close those that did get through before reporting error.
    Previously, a local attacker could cause the system dbus-daemon (or
    another system service with its own DBusServer) to run out of file
    descriptors, by repeatedly connecting to the server and sending fds that
    would get leaked.
    Thanks to Kevin Backhouse of GitHub Security Lab.
    (dbus#294, GHSL-2020-057; Simon McVittie)
  * Fix a crash when the dbus-daemon is terminated while one or more
    monitors are active (dbus#291, dbus!140; Simon McVittie)
  * The dbus-send(1) man page now documents --bus and --peer instead of
    the old --address synonym for --peer, which has been deprecated since
	the introduction of --bus and --peer in 1.7.6
	(fd.o #48816, dbus!115; Chris Morin)
  * Fix a wrong environment variable name in dbus-daemon(1)
    (dbus#275, dbus!122; Mubin, Philip Withnall)
  * Fix formatting of dbus_message_append_args example
	(dbus!126, Felipe Franciosi)
  * Avoid a test failure on Linux when built in a container as uid 0, but

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=294
2020-08-15 22:45:02 +00:00
8b4cd106c1 Accepting request 821367 from home:elimat:branches:Base:System
- Update to 1.12.20
  * On Unix, avoid a use-after-free if two usernames have the same
    numeric uid. In older versions this could lead to a crash (denial of
    service) or other undefined behaviour, possibly including incorrect
    authorization decisions if <policy group=...> is used.
    Like Unix filesystems, D-Bus' model of identity cannot distinguish
    between users of different names with the same numeric uid, so this
    configuration is not advisable on systems where D-Bus will be used.
    Thanks to Daniel Onaca.
    (dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
  * CVE-2020-12049: If a message contains more file descriptors than can
    be sent, close those that did get through before reporting error.
    Previously, a local attacker could cause the system dbus-daemon (or
    another system service with its own DBusServer) to run out of file
    descriptors, by repeatedly connecting to the server and sending fds that
    would get leaked.
    Thanks to Kevin Backhouse of GitHub Security Lab.
    (dbus#294, GHSL-2020-057; Simon McVittie)
  * Fix a crash when the dbus-daemon is terminated while one or more
    monitors are active (dbus#291, dbus!140; Simon McVittie)
  * The dbus-send(1) man page now documents --bus and --peer instead of
    the old --address synonym for --peer, which has been deprecated since
	the introduction of --bus and --peer in 1.7.6
	(fd.o #48816, dbus!115; Chris Morin)
  * Fix a wrong environment variable name in dbus-daemon(1)
    (dbus#275, dbus!122; Mubin, Philip Withnall)
  * Fix formatting of dbus_message_append_args example
	(dbus!126, Felipe Franciosi)
  * Avoid a test failure on Linux when built in a container as uid 0, but
    without the necessary privileges to increase resource limits
	(dbus!58, Debian #908092; Simon McVittie)
  * When building with CMake, cope with libX11 in a non-standard location
	(dbus!129, Tuomo Rinne)
- Run spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/821367
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=293
2020-07-17 00:09:42 +00:00
b91aa737db Accepting request 765601 from home:StefanBruens:branches:Base:System
- Move generation of API docs to a separate package, avoid doxygen
  dependency for building main package.
- Build x11 and devel-doc (API doc) using _multibuild.
- Drop no longer required call to autoreconf, remove obsolete
  BuildRequires for libtool and autoconf-archive.

OBS-URL: https://build.opensuse.org/request/show/765601
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=292
2020-01-30 10:30:51 +00:00
Dominique Leuenberger
fa2cc5666b Accepting request 765871 from Base:System
OBS-URL: https://build.opensuse.org/request/show/765871
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=161
2020-01-25 12:22:54 +00:00