Go to file
Dirk Mueller a8bd6c1553 - update to 1.14.4 (bsc#1204111, CVE-2022-42010,
bsc#1204112, CVE-2022-42011,
                    bsc#1204113, CVE-2022-42012):
  This is a security update for the dbus 1.14.x stable branch, fixing
  denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying
  security hardening (dbus#416).
  Behaviour changes:
  * On Linux, dbus-daemon and other uses of DBusServer now create a
     path-based Unix socket, unix:path=..., when asked to listen on a
     unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to
     unix:dir=... on all platforms.
     Previous versions would have created an abstract socket, unix:abstract=...,
     in this situation.
     This change primarily affects the well-known session bus when run via
     dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring
     dbus with --enable-user-session and running it on a systemd system,
     already used path-based Unix sockets and is unaffected by this change.
     This behaviour change prevents a sandbox escape via the session bus socket
     in sandboxing frameworks that can share the network namespace with the host
     system, such as Flatpak.
     This change might cause a regression in situations where the abstract socket
     is intentionally shared between the host system and a chroot or container,
     such as some use-cases of schroot(1). That regression can be resolved by
     using a bind-mount to share either the D-Bus socket, or the whole /tmp
     directory, with the chroot or container.
     (dbus#416, Simon McVittie)
  * Denial of service fixes:
    - Evgeny Vereshchagin discovered several ways in which an authenticated
      local attacker could cause a crash (denial of service) in
      dbus-daemon --system or a custom DBusServer. In uncommon configurations

OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=326
2022-10-26 09:05:34 +00:00
.gitattributes - buildrequire update-desktop-files for mimetypes.prov 2011-05-18 14:05:04 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dbus-1?expand=0&rev=1 2007-01-15 23:08:38 +00:00
baselibs.conf Update baselibs.conf 2014-09-18 09:18:48 +00:00
dbus-1-devel-doc.changes - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1-devel-doc.spec - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1-x11.changes - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1-x11.spec - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1.14.4.tar.xz - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1.14.4.tar.xz.asc - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1.changes - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
dbus-1.desktop Trying to make this a real link to Factory without too much added files 2013-11-27 18:50:06 +00:00
dbus-1.keyring Accepting request 754216 from home:simotek:branches:Base:System 2019-12-06 04:01:33 +00:00
dbus-1.spec - update to 1.14.4 (bsc#1204111, CVE-2022-42010, 2022-10-26 09:05:34 +00:00
feature-suse-do-autolaunch.patch Accepting request 960246 from home:iznogood:branches:Base:System 2022-03-08 18:40:09 +00:00
feature-suse-log-deny.patch Accepting request 503558 from home:simotek:branches:Base:System 2017-06-19 11:30:43 +00:00
feature-suse-refuse-manual-start-stop.patch Accepting request 960246 from home:iznogood:branches:Base:System 2022-03-08 18:40:09 +00:00
messagebus.conf Accepting request 765344 from home:kukuk:ei-demo 2020-01-20 14:47:46 +00:00