From 815caab58e20dda237d8aa679cdb8a87b9b498e3b3d0ce58f2f135990d16e036 Mon Sep 17 00:00:00 2001 From: Franck Bui Date: Tue, 19 Feb 2019 14:03:00 +0000 Subject: [PATCH] Accepting request 677365 from home:fbui:systemd:openSUSE-Factory - Import commit a1d86af7ed49dacef671e8ec8dae9472a8fa47f5 92d860fc12 sysctl: Don't pass null directive argument to '%s' (bsc#1121563) 1379e30d59 Allocate temporary strings to hold dbus paths on the heap (bsc#1125352 CVE-2019-6454) b5569a03ae Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit. (bsc#1125352 CVE-2019-6454) OBS-URL: https://build.opensuse.org/request/show/677365 OBS-URL: https://build.opensuse.org/package/show/Base:System/systemd?expand=0&rev=1052 --- systemd-mini.changes | 9 +++++++++ systemd-mini.spec | 2 +- systemd-v239+suse.201.g01b4746d3.tar.xz | 3 --- systemd-v239+suse.205.ga1d86af7e.tar.xz | 3 +++ systemd.changes | 9 +++++++++ systemd.spec | 2 +- 6 files changed, 23 insertions(+), 5 deletions(-) delete mode 100644 systemd-v239+suse.201.g01b4746d3.tar.xz create mode 100644 systemd-v239+suse.205.ga1d86af7e.tar.xz diff --git a/systemd-mini.changes b/systemd-mini.changes index 6764ec82..3bc7d4a0 100644 --- a/systemd-mini.changes +++ b/systemd-mini.changes @@ -1,3 +1,12 @@ +------------------------------------------------------------------- +Tue Feb 19 11:08:13 UTC 2019 - Franck Bui + +- Import commit a1d86af7ed49dacef671e8ec8dae9472a8fa47f5 + + 92d860fc12 sysctl: Don't pass null directive argument to '%s' (bsc#1121563) + 1379e30d59 Allocate temporary strings to hold dbus paths on the heap (bsc#1125352 CVE-2019-6454) + b5569a03ae Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit. (bsc#1125352 CVE-2019-6454) + ------------------------------------------------------------------- Fri Feb 15 09:58:17 UTC 2019 - Franck Bui diff --git a/systemd-mini.spec b/systemd-mini.spec index c68a7ff4..a8ccf3f5 100644 --- a/systemd-mini.spec +++ b/systemd-mini.spec @@ -26,7 +26,7 @@ ##### WARNING: please do not edit this auto generated spec file. Use the systemd.spec! ##### %define mini -mini %define min_kernel_version 4.5 -%define suse_version +suse.201.g01b4746d3 +%define suse_version +suse.205.ga1d86af7e %bcond_with gnuefi %if 0%{?bootstrap} diff --git a/systemd-v239+suse.201.g01b4746d3.tar.xz b/systemd-v239+suse.201.g01b4746d3.tar.xz deleted file mode 100644 index 31bf460f..00000000 --- a/systemd-v239+suse.201.g01b4746d3.tar.xz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:dddf6fcddf66af4508851545ee51e3e59fdbe6b1c47e063aaf105f882d17e82f -size 4859328 diff --git a/systemd-v239+suse.205.ga1d86af7e.tar.xz b/systemd-v239+suse.205.ga1d86af7e.tar.xz new file mode 100644 index 00000000..26234af1 --- /dev/null +++ b/systemd-v239+suse.205.ga1d86af7e.tar.xz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:72e095c8eb7312cd4ac735a0186f091799c5ff66bc434e8c49ce0e3655538734 +size 4860080 diff --git a/systemd.changes b/systemd.changes index 6764ec82..3bc7d4a0 100644 --- a/systemd.changes +++ b/systemd.changes @@ -1,3 +1,12 @@ +------------------------------------------------------------------- +Tue Feb 19 11:08:13 UTC 2019 - Franck Bui + +- Import commit a1d86af7ed49dacef671e8ec8dae9472a8fa47f5 + + 92d860fc12 sysctl: Don't pass null directive argument to '%s' (bsc#1121563) + 1379e30d59 Allocate temporary strings to hold dbus paths on the heap (bsc#1125352 CVE-2019-6454) + b5569a03ae Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit. (bsc#1125352 CVE-2019-6454) + ------------------------------------------------------------------- Fri Feb 15 09:58:17 UTC 2019 - Franck Bui diff --git a/systemd.spec b/systemd.spec index e4b82724..1ab8bb15 100644 --- a/systemd.spec +++ b/systemd.spec @@ -24,7 +24,7 @@ %define bootstrap 0 %define mini %nil %define min_kernel_version 4.5 -%define suse_version +suse.201.g01b4746d3 +%define suse_version +suse.205.ga1d86af7e %bcond_with gnuefi %if 0%{?bootstrap}