Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package dbus-1 for openSUSE:Factory checked 
in at 2022-10-27 13:54:08
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dbus-1 (Old)
 and      /work/SRC/openSUSE:Factory/.dbus-1.new.2275 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dbus-1"

Thu Oct 27 13:54:08 2022 rev:175 rq:1031295 version:1.14.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/dbus-1/dbus-1-devel-doc.changes  2022-10-17 
14:57:25.390060836 +0200
+++ /work/SRC/openSUSE:Factory/.dbus-1.new.2275/dbus-1-devel-doc.changes        
2022-10-27 13:54:46.648752712 +0200
@@ -1,0 +2,57 @@
+Wed Oct 26 08:53:48 UTC 2022 - Dirk M??ller <dmuel...@suse.com>
+
+- update to 1.14.4 (bsc#1204111, CVE-2022-42010, 
+                    bsc#1204112, CVE-2022-42011,
+                    bsc#1204113, CVE-2022-42012):
+  This is a security update for the dbus 1.14.x stable branch, fixing
+  denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying
+  security hardening (dbus#416).
+  Behaviour changes:
+  * On Linux, dbus-daemon and other uses of DBusServer now create a
+     path-based Unix socket, unix:path=..., when asked to listen on a
+     unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to
+     unix:dir=... on all platforms.
+     Previous versions would have created an abstract socket, 
unix:abstract=...,
+     in this situation.
+     This change primarily affects the well-known session bus when run via
+     dbus-launch(1) or dbus-run-session(1). The user bus, enabled by 
configuring
+     dbus with --enable-user-session and running it on a systemd system,
+     already used path-based Unix sockets and is unaffected by this change.
+     This behaviour change prevents a sandbox escape via the session bus socket
+     in sandboxing frameworks that can share the network namespace with the 
host
+     system, such as Flatpak.
+     This change might cause a regression in situations where the abstract 
socket
+     is intentionally shared between the host system and a chroot or container,
+     such as some use-cases of schroot(1). That regression can be resolved by
+     using a bind-mount to share either the D-Bus socket, or the whole /tmp
+     directory, with the chroot or container.
+     (dbus#416, Simon McVittie)
+  * Denial of service fixes:
+    - Evgeny Vereshchagin discovered several ways in which an authenticated
+      local attacker could cause a crash (denial of service) in
+      dbus-daemon --system or a custom DBusServer. In uncommon configurations
+      these could potentially be carried out by an authenticated remote 
attacker.
+    - An invalid array of fixed-length elements where the length of the array
+      is not a multiple of the length of the element would cause an assertion
+      failure in debug builds or an out-of-bounds read in production builds.
+      This was a regression in version 1.3.0.
+      (dbus#413, CVE-2022-42011; Simon McVittie)
+    - A syntactically invalid type signature with incorrectly nested 
parentheses
+      and curly brackets would cause an assertion failure in debug builds.
+      Similar messages could potentially result in a crash or incorrect message
+      processing in a production build, although we are not aware of a 
practical
+      example. (dbus#418, CVE-2022-42010; Simon McVittie)
+    - A message in non-native endianness with out-of-band Unix file descriptors
+      would cause a use-after-free and possible memory corruption in production
+      builds, or an assertion failure in debug builds. This was a regression in
+      version 1.3.0. (dbus#417, CVE-2022-42012; Simon McVittie)
+    - Preserve errno on failure to open /proc/self/oom_score_adj
+      (dbus!285, Gentoo#834725; Mike Gilbert)
+    - On Linux, don't log warnings if oom_score_adj is read-only but does not
+      need to be changed (dbus!291, Simon McVittie)
+    - Slightly improve error-handling for inotify
+      (dbus!235, Simon McVittie)
+    - Don't crash if dbus-daemon is asked to watch more than 128 directories
+      for changes (dbus!302, Jan Tojnar)
+
+-------------------------------------------------------------------
dbus-1-x11.changes: same change
dbus-1.changes: same change

Old:
----
  dbus-1.14.0.tar.xz
  dbus-1.14.0.tar.xz.asc

New:
----
  dbus-1.14.4.tar.xz
  dbus-1.14.4.tar.xz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dbus-1-devel-doc.spec ++++++
--- /var/tmp/diff_new_pack.7nunzi/_old  2022-10-27 13:54:47.540757262 +0200
+++ /var/tmp/diff_new_pack.7nunzi/_new  2022-10-27 13:54:47.548757303 +0200
@@ -23,7 +23,7 @@
 %global _backup 
%{_sysconfdir}/sysconfig/services.rpmbak.%{name}-%{version}-%{release}
 %bcond_without selinux
 Name:           dbus-1-devel-doc
-Version:        1.14.0
+Version:        1.14.4
 Release:        0
 Summary:        Developer documentation package for D-Bus
 License:        AFL-2.1 OR GPL-2.0-or-later

++++++ dbus-1-x11.spec ++++++
--- /var/tmp/diff_new_pack.7nunzi/_old  2022-10-27 13:54:47.572757426 +0200
+++ /var/tmp/diff_new_pack.7nunzi/_new  2022-10-27 13:54:47.580757466 +0200
@@ -23,7 +23,7 @@
 %endif
 %bcond_without selinux
 Name:           dbus-1-x11
-Version:        1.14.0
+Version:        1.14.4
 Release:        0
 Summary:        D-Bus Message Bus System
 License:        AFL-2.1 OR GPL-2.0-or-later

++++++ dbus-1.spec ++++++
--- /var/tmp/diff_new_pack.7nunzi/_old  2022-10-27 13:54:47.608757610 +0200
+++ /var/tmp/diff_new_pack.7nunzi/_new  2022-10-27 13:54:47.616757650 +0200
@@ -21,7 +21,7 @@
 %define _libname libdbus-1-3
 %bcond_without selinux
 Name:           dbus-1
-Version:        1.14.0
+Version:        1.14.4
 Release:        0
 Summary:        D-Bus Message Bus System
 License:        AFL-2.1 OR GPL-2.0-or-later

++++++ dbus-1.14.0.tar.xz -> dbus-1.14.4.tar.xz ++++++
++++ 5545 lines of diff (skipped)

Reply via email to