Commit Graph

  • c28febcaaa Accepting request 1322094 from Base:System factory Ana Guerrero 2025-12-12 20:40:16 +00:00
  • 1a99b8a5a9 Accepting request 1322093 from home:simotek:branches:Base:System Simon Lees 2025-12-11 02:44:10 +00:00
  • d8ff36ee94 Accepting request 1228405 from home:simotek:branches:Base:System Simon Lees 2024-12-17 03:38:06 +00:00
  • dc2788aa46 Accepting request 1218244 from home:simotek:branches:Base:System Simon Lees 2024-10-25 12:34:59 +00:00
  • 6a7781b6fb Accepting request 1218217 from home:simotek:branches:Base:System Simon Lees 2024-10-25 10:07:34 +00:00
  • 04cd43f43f Accepting request 1217999 from home:simotek:branches:Base:System Simon Lees 2024-10-25 07:51:22 +00:00
  • 308831323f Accepting request 1208286 from Base:System slfo-main slfo-1.2 Ana Guerrero 2024-10-16 21:36:58 +00:00
  • 67c71cba88 Accepting request 1208286 from Base:System Ana Guerrero 2024-10-16 21:36:58 +00:00
  • 0a5adbcac8 - Drop rcFOO symlinks (PED-266). Simon Lees 2024-10-16 07:25:12 +00:00
  • 11f322c377 Accepting request 1208285 from home:dimstar:Factory Simon Lees 2024-10-16 07:25:12 +00:00
  • b1a47eb2aa Accepting request 1170809 from Base:System Ana Guerrero 2024-08-25 10:10:09 +00:00
  • 044172fc33 Accepting request 1170809 from Base:System Ana Guerrero 2024-08-25 10:10:09 +00:00
  • 6d118d6681 Accepting request 1170797 from home:simotek:branches:Base:System Simon Lees 2024-04-29 14:25:50 +00:00
  • b1908d8382 Accepting request 1170797 from home:simotek:branches:Base:System Simon Lees 2024-04-29 14:25:50 +00:00
  • ebdfbeccae Accepting request 1170132 from home:simotek:branches:Base:System Simon Lees 2024-04-25 10:18:26 +00:00
  • b712bfe4c0 Accepting request 1170132 from home:simotek:branches:Base:System Simon Lees 2024-04-25 10:18:26 +00:00
  • 7864427807 Accepting request 1170122 from home:dimstar:Factory Simon Lees 2024-04-25 09:08:39 +00:00
  • 24797b1f48 Accepting request 1170122 from home:dimstar:Factory Simon Lees 2024-04-25 09:08:39 +00:00
  • 7c5843f438 Accepting request 1170042 from home:simotek:branches:Base:System Simon Lees 2024-04-24 14:08:12 +00:00
  • da0bdc47f2 Accepting request 1170042 from home:simotek:branches:Base:System Simon Lees 2024-04-24 14:08:12 +00:00
  • 46956fc908 Accepting request 1137628 from home:gmbr3:Active Simon Lees 2024-01-09 01:11:33 +00:00
  • 9cc0e8f0ff Accepting request 1137628 from home:gmbr3:Active Simon Lees 2024-01-09 01:11:33 +00:00
  • 642d579f99 Accepting request 1132713 from home:gmbr3:Active Dirk Mueller 2023-12-16 19:17:02 +00:00
  • 5280682e92 Accepting request 1132713 from home:gmbr3:Active Dirk Mueller 2023-12-16 19:17:02 +00:00
  • e9403bf96e Accepting request 1130503 from home:gmbr3:Active Dirk Mueller 2023-12-05 09:45:23 +00:00
  • dd54e6ebd3 Accepting request 1130503 from home:gmbr3:Active Dirk Mueller 2023-12-05 09:45:23 +00:00
  • 5cfcf1f7a8 Expedited checkin of diffutils -> cmp migration Dominique Leuenberger 2023-11-17 14:11:48 +00:00
  • e032d55bf0 Expedited checkin of diffutils -> cmp migration Dominique Leuenberger 2023-11-17 14:11:48 +00:00
  • e1a430deb3 Accepting request 1114292 from home:simotek:branches:Base:System Simon Lees 2023-09-29 09:04:59 +00:00
  • 9077744b0e Accepting request 1114292 from home:simotek:branches:Base:System Simon Lees 2023-09-29 09:04:59 +00:00
  • e99c687bd3 Accepting request 1113381 from home:simotek:branches:Broker Dirk Mueller 2023-09-28 07:43:29 +00:00
  • 31429ce288 Accepting request 1113381 from home:simotek:branches:Broker Dirk Mueller 2023-09-28 07:43:29 +00:00
  • c4836eae87 Accepting request 1112496 from Base:System Ana Guerrero 2023-09-22 19:47:07 +00:00
  • 2190cd9fb1 Accepting request 1112496 from Base:System Ana Guerrero 2023-09-22 19:47:07 +00:00
  • a2330cfb84 - update to 1.14.10: * Avoid a dbus-daemon crash if re-creating a connection's policy fails. If it isn't possible to re-create its policy (for example if it belongs to a user account that has been deleted or if the Name Service Switch is broken, on a system not supporting SO_PEERGROUPS), we now log a warning, continue to use its current policy, and continue to reload other connections' policies. * If getting the groups from a user ID fails, report the error correctly, instead of logging "(null)" * Return the primary group ID in GetConnectionCredentials()' UnixGroupIDs field for processes with a valid-but-empty supplementary group list - Disable asserts (bsc#1087072) - set runstatedir correctly - avoid listing cmake directory - owned by cmake package - Use sysusers.d to create messagebus user Dirk Mueller 2023-09-13 08:46:45 +00:00
  • 31999f28c5 - update to 1.14.10: * Avoid a dbus-daemon crash if re-creating a connection's policy fails. If it isn't possible to re-create its policy (for example if it belongs to a user account that has been deleted or if the Name Service Switch is broken, on a system not supporting SO_PEERGROUPS), we now log a warning, continue to use its current policy, and continue to reload other connections' policies. * If getting the groups from a user ID fails, report the error correctly, instead of logging "(null)" * Return the primary group ID in GetConnectionCredentials()' UnixGroupIDs field for processes with a valid-but-empty supplementary group list - Disable asserts (bsc#1087072) - set runstatedir correctly - avoid listing cmake directory - owned by cmake package - Use sysusers.d to create messagebus user Dirk Mueller 2023-09-13 08:46:45 +00:00
  • bef8189712 Accepting request 1092691 from Base:System Dominique Leuenberger 2023-06-14 14:28:56 +00:00
  • 2a718084c6 Accepting request 1092691 from Base:System Dominique Leuenberger 2023-06-14 14:28:56 +00:00
  • dcd95237cf - update to 1.14.8 (bsc#1212126, CVE-2023-34969): Dirk Mueller 2023-06-12 21:17:59 +00:00
  • 853fbb2566 - update to 1.14.8 (bsc#1212126, CVE-2023-34969): Dirk Mueller 2023-06-12 21:17:59 +00:00
  • 3aa97ec44a - update to 1.14.8: * Denial-of-service fixes: * Fix an assertion failure in dbus-daemon when a privileged Monitoring connection (dbus-monitor, busctl monitor, gdbus monitor or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. This is a denial of service if triggered maliciously by a local attacker. * Fix compilation on compilers not supporting __FUNCTION__ * Fix some memory leaks on out-of-memory conditions * Fix syntax of a code sample in dbus-api-design Dirk Mueller 2023-06-12 21:16:15 +00:00
  • a2da7f8319 - update to 1.14.8: * Denial-of-service fixes: * Fix an assertion failure in dbus-daemon when a privileged Monitoring connection (dbus-monitor, busctl monitor, gdbus monitor or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. This is a denial of service if triggered maliciously by a local attacker. * Fix compilation on compilers not supporting __FUNCTION__ * Fix some memory leaks on out-of-memory conditions * Fix syntax of a code sample in dbus-api-design Dirk Mueller 2023-06-12 21:16:15 +00:00
  • 7af63810f2 Accepting request 1067484 from Base:System Dominique Leuenberger 2023-03-02 22:02:00 +00:00
  • 66f0a0d8ba Accepting request 1067484 from Base:System Dominique Leuenberger 2023-03-02 22:02:00 +00:00
  • b54e0829fa Accepting request 1067438 from home:gmbr3:Active Simon Lees 2023-02-23 23:38:21 +00:00
  • 4428e7988e Accepting request 1067438 from home:gmbr3:Active Simon Lees 2023-02-23 23:38:21 +00:00
  • b56bd0fa36 Accepting request 1066638 from home:gmbr3:Active Dirk Mueller 2023-02-23 14:02:44 +00:00
  • 75401e655c Accepting request 1066638 from home:gmbr3:Active Dirk Mueller 2023-02-23 14:02:44 +00:00
  • 9109799af2 Accepting request 1064302 from Base:System Dominique Leuenberger 2023-02-11 20:55:59 +00:00
  • 7a322afc1e Accepting request 1064302 from Base:System Dominique Leuenberger 2023-02-11 20:55:59 +00:00
  • fabec3cb1f OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=330 Fridrich Strba 2023-02-10 16:31:13 +00:00
  • d69e517e9e OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=330 Fridrich Strba 2023-02-10 16:31:13 +00:00
  • 6fc53b808d Accepting request 1064293 from home:dimstar:Factory Fridrich Strba 2023-02-10 16:29:55 +00:00
  • b02c06f6fb Accepting request 1064293 from home:dimstar:Factory Fridrich Strba 2023-02-10 16:29:55 +00:00
  • 6a83c1aecf - update to 1.14.6: * Fix an incorrect assertion that could be used to crash dbus-daemon or other users of DBusServer prior to authentication, if libdbus was compiled with assertions enabled. We recommend that production builds of dbus, for example in OS distributions, should be compiled with checks but without assertions. * When connected to a dbus-broker, stop dbus-monitor from incorrectly replying to Peer method calls that were sent to the dbus-broker with a NULL destination * Fix out-of-bounds varargs read in the dbus-daemon's config- parser. This is not attacker-triggerable and appears to be harmless in practice, but is technically undefined behaviour and is detected as such by AddressSanitizer. * Avoid a data race in multi-threaded use of DBusCounter * Fix a crash with some glibc versions when non-auditable SELinux events are logged (dbus!386, Jeremi Piotrowski) * If dbus_message_demarshal() runs out of memory while validating a message, report it as NoMemory rather than InvalidArgs (dbus#420, Simon McVittie) * Use C11 _Alignof if available, for better standards- compliance * Stop including an outdated copy of pkg.m4 in the git tree * Documentation: * Fix the test-apparmor-activation test after dbus#416 * Internal changes: * Fix CI builds with recent git versions (dbus#447, Simon McVittie) - switch to using multibuild Dirk Mueller 2023-02-09 17:09:45 +00:00
  • 64ca67738d - update to 1.14.6: * Fix an incorrect assertion that could be used to crash dbus-daemon or other users of DBusServer prior to authentication, if libdbus was compiled with assertions enabled. We recommend that production builds of dbus, for example in OS distributions, should be compiled with checks but without assertions. * When connected to a dbus-broker, stop dbus-monitor from incorrectly replying to Peer method calls that were sent to the dbus-broker with a NULL destination * Fix out-of-bounds varargs read in the dbus-daemon's config- parser. This is not attacker-triggerable and appears to be harmless in practice, but is technically undefined behaviour and is detected as such by AddressSanitizer. * Avoid a data race in multi-threaded use of DBusCounter * Fix a crash with some glibc versions when non-auditable SELinux events are logged (dbus!386, Jeremi Piotrowski) * If dbus_message_demarshal() runs out of memory while validating a message, report it as NoMemory rather than InvalidArgs (dbus#420, Simon McVittie) * Use C11 _Alignof if available, for better standards- compliance * Stop including an outdated copy of pkg.m4 in the git tree * Documentation: * Fix the test-apparmor-activation test after dbus#416 * Internal changes: * Fix CI builds with recent git versions (dbus#447, Simon McVittie) - switch to using multibuild Dirk Mueller 2023-02-09 17:09:45 +00:00
  • 97c139473e Accepting request 1031295 from Base:System Dominique Leuenberger 2022-10-27 11:54:08 +00:00
  • 9591d9a853 Accepting request 1031295 from Base:System Dominique Leuenberger 2022-10-27 11:54:08 +00:00
  • a8bd6c1553 - update to 1.14.4 (bsc#1204111, CVE-2022-42010, bsc#1204112, CVE-2022-42011, bsc#1204113, CVE-2022-42012): This is a security update for the dbus 1.14.x stable branch, fixing denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying security hardening (dbus#416). Behaviour changes: * On Linux, dbus-daemon and other uses of DBusServer now create a path-based Unix socket, unix:path=..., when asked to listen on a unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to unix:dir=... on all platforms. Previous versions would have created an abstract socket, unix:abstract=..., in this situation. This change primarily affects the well-known session bus when run via dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring dbus with --enable-user-session and running it on a systemd system, already used path-based Unix sockets and is unaffected by this change. This behaviour change prevents a sandbox escape via the session bus socket in sandboxing frameworks that can share the network namespace with the host system, such as Flatpak. This change might cause a regression in situations where the abstract socket is intentionally shared between the host system and a chroot or container, such as some use-cases of schroot(1). That regression can be resolved by using a bind-mount to share either the D-Bus socket, or the whole /tmp directory, with the chroot or container. (dbus#416, Simon McVittie) * Denial of service fixes: - Evgeny Vereshchagin discovered several ways in which an authenticated local attacker could cause a crash (denial of service) in dbus-daemon --system or a custom DBusServer. In uncommon configurations Dirk Mueller 2022-10-26 09:05:34 +00:00
  • d2b9b851b0 - update to 1.14.4 (bsc#1204111, CVE-2022-42010, bsc#1204112, CVE-2022-42011, bsc#1204113, CVE-2022-42012): This is a security update for the dbus 1.14.x stable branch, fixing denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying security hardening (dbus#416). Behaviour changes: * On Linux, dbus-daemon and other uses of DBusServer now create a path-based Unix socket, unix:path=..., when asked to listen on a unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to unix:dir=... on all platforms. Previous versions would have created an abstract socket, unix:abstract=..., in this situation. This change primarily affects the well-known session bus when run via dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring dbus with --enable-user-session and running it on a systemd system, already used path-based Unix sockets and is unaffected by this change. This behaviour change prevents a sandbox escape via the session bus socket in sandboxing frameworks that can share the network namespace with the host system, such as Flatpak. This change might cause a regression in situations where the abstract socket is intentionally shared between the host system and a chroot or container, such as some use-cases of schroot(1). That regression can be resolved by using a bind-mount to share either the D-Bus socket, or the whole /tmp directory, with the chroot or container. (dbus#416, Simon McVittie) * Denial of service fixes: - Evgeny Vereshchagin discovered several ways in which an authenticated local attacker could cause a crash (denial of service) in dbus-daemon --system or a custom DBusServer. In uncommon configurations Dirk Mueller 2022-10-26 09:05:34 +00:00
  • ab1bfa144e Accepting request 1011186 from Base:System Dominique Leuenberger 2022-10-17 12:57:21 +00:00
  • 5c8650722c Accepting request 1011186 from Base:System Dominique Leuenberger 2022-10-17 12:57:21 +00:00
  • 7cc928f081 Accepting request 1011151 from home:iznogood:branches:Base:System Simon Lees 2022-10-15 23:02:03 +00:00
  • a2e0c294a2 Accepting request 1011151 from home:iznogood:branches:Base:System Simon Lees 2022-10-15 23:02:03 +00:00
  • 9151565052 Accepting request 1010413 from Base:System Dominique Leuenberger 2022-10-14 13:40:20 +00:00
  • 55e1defd4f Accepting request 1010413 from Base:System Dominique Leuenberger 2022-10-14 13:40:20 +00:00
  • 6b7a0f88d7 - Disable asserts (bsc#1087072) Dirk Mueller 2022-10-13 07:30:23 +00:00
  • a63025a0d4 - Disable asserts (bsc#1087072) Dirk Mueller 2022-10-13 07:30:23 +00:00
  • 69bcb04113 Accepting request 981473 from Base:System Dominique Leuenberger 2022-06-12 15:36:52 +00:00
  • efae0cab70 Accepting request 981473 from Base:System Dominique Leuenberger 2022-06-12 15:36:52 +00:00
  • 030bfd6f94 - update to 2.23: * Python now waits on child processes with os.wait() * open() call with O_CREAT now passes permissions * -Ttext-segment argument on aarch64 passes page size in hex * Build system improvements - add disable-morecore.patch: fix build and working with glibc >= 2.34 - rediff patches Dirk Mueller 2022-06-09 09:57:20 +00:00
  • 0a02c9987e - update to 2.23: * Python now waits on child processes with os.wait() * open() call with O_CREAT now passes permissions * -Ttext-segment argument on aarch64 passes page size in hex * Build system improvements - add disable-morecore.patch: fix build and working with glibc >= 2.34 - rediff patches Dirk Mueller 2022-06-09 09:57:20 +00:00
  • fc4d97e228 - version provides - add split provides - remove unused/obsolete pre_checkin.sh Dirk Mueller 2022-06-08 12:36:41 +00:00
  • 5a965e641e - version provides - add split provides - remove unused/obsolete pre_checkin.sh Dirk Mueller 2022-06-08 12:36:41 +00:00
  • f939af0947 Accepting request 979267 from home:simotek:broker Dirk Mueller 2022-06-08 12:33:33 +00:00
  • b84e5435aa Accepting request 979267 from home:simotek:broker Dirk Mueller 2022-06-08 12:33:33 +00:00
  • ce628c6a80 Accepting request 962877 from Base:System Dominique Leuenberger 2022-03-19 21:20:29 +00:00
  • 64004da537 Accepting request 962877 from Base:System Dominique Leuenberger 2022-03-19 21:20:29 +00:00
  • 8b9e5e4ae2 Accepting request 962625 from home:Vogtinator:branches:Base:System Dirk Mueller 2022-03-18 16:09:03 +00:00
  • 5a55f53a0f Accepting request 962625 from home:Vogtinator:branches:Base:System Dirk Mueller 2022-03-18 16:09:03 +00:00
  • 63a30f45a2 Accepting request 961966 from Base:System Dominique Leuenberger 2022-03-16 20:30:31 +00:00
  • a7a6ca81f6 Accepting request 961966 from Base:System Dominique Leuenberger 2022-03-16 20:30:31 +00:00
  • e47922d8b1 OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=314 Dirk Mueller 2022-03-15 16:26:11 +00:00
  • 62691863a6 OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=314 Dirk Mueller 2022-03-15 16:26:11 +00:00
  • aa2309df38 - set runstatedir correctly Dirk Mueller 2022-03-14 10:47:02 +00:00
  • 67c44f75ed - set runstatedir correctly Dirk Mueller 2022-03-14 10:47:02 +00:00
  • c97c98bd1f Accepting request 960278 from Base:System Dominique Leuenberger 2022-03-11 20:39:55 +00:00
  • 81b9a178e5 Accepting request 960278 from Base:System Dominique Leuenberger 2022-03-11 20:39:55 +00:00
  • 11f4778ee0 Accepting request 960246 from home:iznogood:branches:Base:System Dirk Mueller 2022-03-08 18:40:09 +00:00
  • 61946e6665 Accepting request 960246 from home:iznogood:branches:Base:System Dirk Mueller 2022-03-08 18:40:09 +00:00
  • 46ad4084dc Accepting request 958730 from Base:System Dominique Leuenberger 2022-03-05 13:43:38 +00:00
  • 3488116bda Accepting request 958730 from Base:System Dominique Leuenberger 2022-03-05 13:43:38 +00:00
  • dec2cdcef2 Accepting request 958337 from home:iznogood:branches:Base:System Dirk Mueller 2022-03-03 10:22:48 +00:00
  • e936788be4 Accepting request 958337 from home:iznogood:branches:Base:System Dirk Mueller 2022-03-03 10:22:48 +00:00
  • 20f8054c59 Accepting request 933402 from Base:System Dominique Leuenberger 2021-11-26 23:50:36 +00:00
  • 92959078cc Accepting request 933402 from Base:System Dominique Leuenberger 2021-11-26 23:50:36 +00:00
  • 357aa54d6f Accepting request 932654 from home:gmbr3:Active Dirk Mueller 2021-11-24 08:38:49 +00:00
  • f34931de4a Accepting request 932654 from home:gmbr3:Active Dirk Mueller 2021-11-24 08:38:49 +00:00
  • c47005334b Accepting request 921166 from home:schubi2 Simon Lees 2021-09-23 23:01:29 +00:00
  • b7270e77f2 Accepting request 921166 from home:schubi2 Simon Lees 2021-09-23 23:01:29 +00:00