Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package flatpak for openSUSE:Factory checked 
in at 2021-01-19 16:01:07
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/flatpak (Old)
 and      /work/SRC/openSUSE:Factory/.flatpak.new.28504 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "flatpak"

Tue Jan 19 16:01:07 2021 rev:54 rq:864077 version:1.10.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/flatpak/flatpak.changes  2021-01-11 
17:10:56.256132498 +0100
+++ /work/SRC/openSUSE:Factory/.flatpak.new.28504/flatpak.changes       
2021-01-19 16:01:25.675310455 +0100
@@ -1,0 +2,33 @@
+Fri Jan 15 16:06:24 UTC 2021 - Bj??rn Lie <bjorn....@gmail.com>
+
+- Update to version 1.10.0:
+  + The major new feature in this series compared to 1.8 is the
+    support for the new repo format which should make updates
+    faster and download less data.
+  + The systemd generator snippets now call flatpak
+    --print-updated-env in place of a bunch of shell for better
+    login performance.
+  + The .profile snippets now disable GVfs when calling flatpak to
+    avoid spawning a gvfs daemon when logging in via ssh.
+  + Build fixes for GCC 11.
+  + Flatpak now finds the pulseaudio sockets better in uncommon
+    configurations.
+  + Sandboxes with network access it now also has access to the
+    systemd-resolved socket to do dns lookups.
+  + Flatpak supports unsetting env vars in the sandbox using
+    --unset-env, and --env=FOO= now sets FOO to the empty string
+    instead of unsetting it.
+  + Similarly the spawn portal has an option to unset an env var.
+  + The spawn portal now has an option to share the pid namespace
+    with the sub-sandbox.
+
+-------------------------------------------------------------------
+Fri Jan 15 16:02:40 UTC 2021 - Bj??rn Lie <bjorn....@gmail.com>
+
+- Update to version 1.8.5 (CVE-2021-21261):
+  + This is a security update that fixes a sandbox escape where a
+    malicious application can execute code outside the sandbox by
+    controlling the environment of the "flatpak run" command when
+    spawning a sub-sandbox.
+
+-------------------------------------------------------------------

Old:
----
  flatpak-1.8.4.tar.xz

New:
----
  flatpak-1.10.0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ flatpak.spec ++++++
--- /var/tmp/diff_new_pack.plYKoR/_old  2021-01-19 16:01:26.463311646 +0100
+++ /var/tmp/diff_new_pack.plYKoR/_new  2021-01-19 16:01:26.467311653 +0100
@@ -32,7 +32,7 @@
 
 %define libname libflatpak0
 Name:           flatpak
-Version:        1.8.4
+Version:        1.10.0
 Release:        0
 Summary:        OSTree based application bundles management
 License:        LGPL-2.1-or-later
@@ -176,6 +176,7 @@
 
 %if !%{support_environment_generators}
 rm -Rf %{buildroot}%{_systemd_user_env_generator_dir}
+rm -Rf %{buildroot}%{_systemd_system_env_generator_dir}
 %endif
 
 mkdir -p %{buildroot}%{_sysconfdir}/flatpak/remotes.d
@@ -245,6 +246,7 @@
 %if %{support_environment_generators}
 %dir %{_systemd_user_env_generator_dir}
 %{_systemd_user_env_generator_dir}/60-flatpak
+%{_systemd_system_env_generator_dir}/60-flatpak-system-only
 %else
 # Own dirs so we don't have to depend on gdm for building.
 %dir %{_datadir}/gdm/

++++++ _service ++++++
--- /var/tmp/diff_new_pack.plYKoR/_old  2021-01-19 16:01:26.491311689 +0100
+++ /var/tmp/diff_new_pack.plYKoR/_new  2021-01-19 16:01:26.491311689 +0100
@@ -4,7 +4,7 @@
     <param name="url">https://github.com/flatpak/flatpak.git</param>
     <param name="scm">git</param>
     <param name="versionformat">@PARENT_TAG@</param>
-    <param name="revision">refs/tags/1.8.4</param>
+    <param name="revision">refs/tags/1.10.0</param>
   </service>
   <service name="recompress" mode="disabled">
     <param name="file">*.tar</param>

++++++ flatpak-1.8.4.tar.xz -> flatpak-1.10.0.tar.xz ++++++
++++ 136852 lines of diff (skipped)

Reply via email to