Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:rhabacker:branches:windows:mingw:win32
mingw32-dbus-1
mingw32-dbus-1.changes
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File mingw32-dbus-1.changes of Package mingw32-dbus-1
------------------------------------------------------------------- Mon Apr 1 19:12:25 UTC 2024 - Ralf Habacker <ralf.habacker@freenet.de> - Update to dbus 1.14.10 (2022-10-05) Bug fixes: * Avoid a dbus-daemon crash if re-creating a connection's policy fails. If it isn't possible to re-create its policy (for example if it belongs to a user account that has been deleted or if the Name Service Switch is broken, on a system not supporting SO_PEERGROUPS), we now log a warning, continue to use its current policy, and continue to reload other connections' policies. (dbus#343; Peter Benie, Simon McVittie) * If getting the groups from a user ID fails, report the error correctly, instead of logging "(null)" (dbus#343, Simon McVittie) * Return the primary group ID in GetConnectionCredentials()' UnixGroupIDs field for processes with a valid-but-empty supplementary group list (dbus!422, cptpcrd) - Update to dbus 1.14.8 (2023-06-06) Denial-of-service fixes: * Fix an assertion failure in dbus-daemon when a privileged Monitoring connection (dbus-monitor, busctl monitor, gdbus monitor or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. This is a denial of service if triggered maliciously by a local attacker. (dbus#457; hongjinghao, Simon McVittie) Other fixes: * Fix compilation on compilers not supporting __FUNCTION__ (dbus!404, Barnabás Pőcze) * Fix some memory leaks on out-of-memory conditions (dbus!403, Barnabás Pőcze) * Documentation: · Fix syntax of a code sample in dbus-api-design (dbus!396; Yen-Chin, Lee) Tests and CI enhancements: * Fix CI pipelines after freedesktop/freedesktop#540 (dbus!405, dbus#456; Simon McVittie) - Update to dbus 1.14.6 (2023-02-08) Denial of service fixes: * Fix an incorrect assertion that could be used to crash dbus-daemon or other users of DBusServer prior to authentication, if libdbus was compiled with assertions enabled. We recommend that production builds of dbus, for example in OS distributions, should be compiled with checks but without assertions. (dbus#421, Ralf Habacker; thanks to Evgeny Vereshchagin) Other fixes: * When connected to a dbus-broker, stop dbus-monitor from incorrectly replying to Peer method calls that were sent to the dbus-broker with a NULL destination (dbus#301, Kai A. Hiller) * Fix out-of-bounds varargs read in the dbus-daemon's config-parser. This is not attacker-triggerable and appears to be harmless in practice, but is technically undefined behaviour and is detected as such by AddressSanitizer. (dbus!357, Evgeny Vereshchagin) * Avoid a data race in multi-threaded use of DBusCounter (dbus#426, Ralf Habacker) * Fix a crash with some glibc versions when non-auditable SELinux events are logged (dbus!386, Jeremi Piotrowski) * If dbus_message_demarshal() runs out of memory while validating a message, report it as NoMemory rather than InvalidArgs (dbus#420, Simon McVittie) * Use C11 _Alignof if available, for better standards-compliance (dbus!389, Khem Raj) * Stop including an outdated copy of pkg.m4 in the git tree (dbus!365, Simon McVittie) * Documentation: · Consistently use Gitlab bug reporting URL (dbus!372, Marco Trevisan) * Tests fixes: · Fix the test-apparmor-activation test after dbus#416 (dbus!380, Dave Jones) Internal changes: * Fix CI builds with recent git versions (dbus#447, Simon McVittie) - Updated patch to fix building on Tumbleweed: * add patch dbus-1.14.4-add-enable-relocation-force.patch ------------------------------------------------------------------- Wed Jan 18 23:53:46 UTC 2023 - Ralf Habacker <ralf.habacker@freenet.de> - Update package * drop installing file INSTALL to fix warning: install-file-in-docs * drop obsolete patch add-enable-relocation-force.patch * drop obsolete BuildRoot * drop unused doc install dir 'dbus-1' * add patch dbus-1.14.4-add-enable-relocation-force.patch * reorder file list * use %autosetup ------------------------------------------------------------------- Wed Jan 18 23:29:00 UTC 2023 - Ralf Habacker <ralf.habacker@freenet.de> - Update to dbus 1.14.4 (2022-10-05) This is a security update for the dbus 1.14.x stable branch, fixing denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying security hardening (dbus#416). Behaviour changes: * On Linux, dbus-daemon and other uses of DBusServer now create a path-based Unix socket, unix:path=..., when asked to listen on a unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to unix:dir=... on all platforms. Previous versions would have created an abstract socket, unix:abstract=..., in this situation. This change primarily affects the well-known session bus when run via dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring dbus with --enable-user-session and running it on a systemd system, already used path-based Unix sockets and is unaffected by this change. This behaviour change prevents a sandbox escape via the session bus socket in sandboxing frameworks that can share the network namespace with the host system, such as Flatpak. This change might cause a regression in situations where the abstract socket is intentionally shared between the host system and a chroot or container, such as some use-cases of schroot(1). That regression can be resolved by using a bind-mount to share either the D-Bus socket, or the whole /tmp directory, with the chroot or container. (dbus#416, Simon McVittie) Denial of service fixes: Evgeny Vereshchagin discovered several ways in which an authenticated local attacker could cause a crash (denial of service) in dbus-daemon --system or a custom DBusServer. In uncommon configurations these could potentially be carried out by an authenticated remote attacker. * An invalid array of fixed-length elements where the length of the array is not a multiple of the length of the element would cause an assertion failure in debug builds or an out-of-bounds read in production builds. This was a regression in version 1.3.0. (dbus#413, CVE-2022-42011; Simon McVittie) * A syntactically invalid type signature with incorrectly nested parentheses and curly brackets would cause an assertion failure in debug builds. Similar messages could potentially result in a crash or incorrect message processing in a production build, although we are not aware of a practical example. (dbus#418, CVE-2022-42010; Simon McVittie) * A message in non-native endianness with out-of-band Unix file descriptors would cause a use-after-free and possible memory corruption in production builds, or an assertion failure in debug builds. This was a regression in version 1.3.0. (dbus#417, CVE-2022-42012; Simon McVittie) - Update to dbus 1.14.2 (2022-09-26) Fixes: * Fix build failure on FreeBSD (dbus!277, Alex Richardson) * Fix build failure on macOS with launchd enabled (dbus!287, Dawid Wróbel) * Preserve errno on failure to open /proc/self/oom_score_adj (dbus!285, Gentoo#834725; Mike Gilbert) * On Linux, don't log warnings if oom_score_adj is read-only but does not need to be changed (dbus!291, Simon McVittie) * Slightly improve error-handling for inotify (dbus!235, Simon McVittie) * Don't crash if dbus-daemon is asked to watch more than 128 directories for changes (dbus!302, Jan Tojnar) * Autotools build system fixes: · Don't treat --with-x or --with-x=yes as a request to disable X11, fixing a regression in 1.13.20. Instead, require X11 libraries and fail if they cannot be detected. (dbus!263, Lars Wendler) · When a CMake project uses an Autotools-built libdbus in a non-standard prefix, find dbus-arch-deps.h successfully (dbus#314, Simon McVittie) · Don't include generated XML catalog in source releases (dbus!317, Jan Tojnar) · Improve robustness of detecting gcc __sync atomic builtins (dbus!320, Alex Richardson) * CMake build system fixes: · Detect endianness correctly, fixing interoperability with other D-Bus implementations on big-endian systems (dbus#375, Ralf Habacker) · When building for Unix, install session and system bus setup in the intended locations (dbus!267, dbus!297; Ralf Habacker, Alex Richardson) · Detect setresuid() and getresuid() (dbus!319, Alex Richardson) · Detect backtrace() on FreeBSD (dbus!281, Alex Richardson) · Don't include headers from parent directory (dbus!282, Alex Richardson) · Distinguish between host and target TMPDIR when cross-compiling (dbus!279, Alex Richardson) · Fix detection of atomic operations (dbus!306, Alex Richardson) Tests and CI enhancements: * On Unix, skip tests that switch uid if run in a container that is unable to do so, instead of failing (dbus#407, Simon McVittie) * Use the latest MSYS2 packages for CI (Ralf Habacker, Simon McVittie) - Update to dbus 1.14.0 (2022-02-28) 1.14.x is a new stable branch, superseding 1.12.x. Summary of major changes between 1.12.x and 1.14.0 -------------------------------------------------- Dependencies: * dbus now requires at least a basic level of support for C99 variadic macros, as implemented in gcc >= 3, all versions of Clang, and MSVC >= 2005. In practice this requirement has existed since version 1.9.2, but it is now official. * dbus now requires a C99-compatible va_copy() macro (or a __va_copy() macro with the same behaviour), except when building for Windows using MSVC and CMake. * On Unix platforms, if getpwnam_r() and getgrnam_r() are implemented, they must be POSIX-conformant. The non-POSIX signature seen in ancient Solaris versions will no longer work. * All Windows builds now require Windows Vista or later. (Note that we do not recommend or support use of dbus on operating systems outside their vendor's security support lifetime, such as Vista.) * GLib >= 2.38 is required if full test coverage is enabled (reduced from 2.40 in dbus 1.12.x.) * Building using CMake now requires CMake 3.4. * Building documentation using CMake now requires xsltproc, Docbook DTDs (for example docbook-xml on Debian derivatives), and Docbook XSLT stylesheets (for example docbook-xsl on Debian derivatives). Using KDE's meinproc4 documentation processor is no longer supported. Build-time configuration changes: * Move CMake build system to top level, matching normal practice for CMake projects Deprecations: * Third-party software should install default dbus policies for the system bus into ${datadir}/dbus-1/system.d (this has been supported since dbus 1.10, released in August 2015). Installing default dbus policies in ${sysconfdir}/dbus-1/system.d is now considered to be deprecated. Policy files in ${sysconfdir}/dbus-1/system.d continue to be read, but this directory should only be used by system administrators wishing to override the default policies. The ${datadir} applicable to dbus is usually /usr/share and the ${sysconfdir} is usually /etc. * A similar pattern applies to the session bus policies in session.d. * The dbus-send(1) man page now documents --bus and --peer instead of the old --address synonym for --peer, which has been deprecated since the introduction of --bus and --peer in 1.7.6 * The dbus-daemon man page now has scarier warnings about <allow_anonymous/> and non-local TCP, which are insecure and should not be used, particularly for the standard system and session buses * DBusServer (and hence the dbus-daemon) no longer accepts usernames (login names) for the recommended EXTERNAL authentication mechanism, only numeric user IDs or the empty string. See 1.13.0 release notes for full details. New features: * On Linux 4.13 or later when built against a suitable glibc version, GetConnectionCredentials() now includes UnixGroupIDs, the effective group IDs of the initiator of the connection, taken from SO_PEERGROUPS. * On Linux 4.13 or later, <policy group="…"> now uses the SO_PEERGROUPS credentials-passing socket option to get the effective group IDs of the initiator of the connection. See 1.13.4 release notes for details. * Add a --sender option to dbus-send, which requests a name and holds it until the signal has been sent * dbus-daemon <allow> and <deny> rules can now specify a send_destination_prefix attribute, which is like a combination of send_destination and the arg0namespace keyword in match rules. See 1.13.12 release notes for more details * The dbus-daemon now filters the messages that it relays, removing header fields that it does not understand. Clients must not rely on this behaviour unless they have confirmed that they are connected to a suitable message bus implementation, for example by querying its Features property. * The dbus-daemon now emits a signal, ActivatableServicesChanged, when the list of activatable services may have changed. Support for this signal can be discovered by querying the Features property. * It is now possible to disable traditional (non-systemd) service activation at build-time (Autotools: --disable-traditional-activation, CMake: -DENABLE_TRADITIONAL_ACTIVATION=OFF). See 1.13.10 release notes for details. * The API reference manual can be built as a Qt compiled help file if qhelpgenerator(-qt5) is available. See 1.13.16 release notes for details. Miscellaneous behaviour changes: * When using the "user bus" (--enable-user-session), put the dbus-daemon in the session slice * Several environment variables set by systemd are no longer passed on to activated services * If the dbus-daemon is compiled for Linux with systemd support, it now informs systemd that it is ready for use via the sd_notify() mechanism * Tarball releases no longer contain pre-2007 changelogs and are now compressed with xz, making them around 35% smaller. Changes since 1.13.22 --------------------- * On Windows, consistently use msvcrt.dll-style printf formats, fixing builds with mingw-w64 8.0.0 (dbus#380, Simon McVittie) * Fix some broken links in the API design document (dbus!257, Michael Nosthoff) * CI updates · Enable -Werror for the CMake builds · Use https to download MSYS packages · Use Debian 11 for most builds · Stop testing on Debian 9, which is EOL · Stop testing on Ubuntu 16.04, which is EOL · Remove workarounds for missing/outdated packages in Debian 8, Debian 9 and Ubuntu 16.04 (dbus#380, dbus!260; Simon McVittie) - Update to dbus 1.13.22 (2022-02-23) This is a release candidate for a new dbus 1.14.x stable branch. Enhancements: * D-Bus Specification 0.38: · Add ActivatableServicesChanged signal and feature flag (dbus#376, Ralf Habacker) · Document * as optionally-escaped in D-Bus addresses, matching the implementation (dbus!248, Kir Kolyshkin) * Emit the new ActivatableServicesChanged signal when configuration and/or activatable services are reloaded (dbus#376, Ralf Habacker) * Add an XML catalog file for the DTDs we install (dbus!202, Jan Tojnar) Bug fixes: * On Linux, when using traditional (non-systemd) service activation, don't log warnings about failing to reset OOM score adjustment if the process is already more susceptible to the OOM killer, as user processes usually are with systemd ≥ 250. (dbus#374, Simon McVittie) * On Linux, when using traditional (non-systemd) system bus activation, reset the OOM score adjustment to 0 as intended. If the system dbus-daemon is protected from the OOM killer, this avoids that protection unintentionally being inherited by every system service. (dbus#378, Simon McVittie) * Fix a code path that could result in a crash on out-of-memory (dbus#246, Marc-André Lureau) * Fix compilation if embedded tests are enabled but verbose mode and stats are both disabled (Marc-André Lureau) * CMake: Improve support for Windows with MSVC and add CI coverage (dbus!218, Marc-André Lureau) * CMake: Improve Docbook documentation-generation (dbus#377, Ralf Habacker) * On Linux, fix a race condition in the integration test for transient services (Debian#1005889, dbus!256; Simon McVittie) - Update to dbus 1.13.20 (2021-12-17) The “not how anyone wanted to learn the Greek alphabet” release. Dependencies: * Building using CMake now requires CMake 3.4. Enhancements: * D-Bus Specification 0.37: · Update recommendations for DBUS_COOKIE_SHA1 timeouts (dbus!171, Simon McVittie) · Clarify padding requirements for arrays and variants (dbus!203, Zeeshan Ali) · Describe where the interoperable machine ID comes from (dbus!198, Thomas Kluyver) · Clarify use of dictionary (array of dict-entry) types (dbus#347, Ralf Habacker) * When using the "user bus" (--enable-user-session), put the dbus-daemon in the session slice (dbus!219, David Redondo) Feature removal: * Disable the experimental Containers1 interface that was added in 1.13.0. It is incomplete and not ready for production use, so we're disabling it in preparation for a new 1.14.x stable branch; the code remains present and will be re-enabled later, but there is no longer a build-time configuration option to enable it. (dbus!236, Simon McVittie) Bug fixes: * Avoid malloc() after fork on non-GNU libc (dbus!181, Jean-Louis Fuchs) * Don't return successfully from RemoveMatch if the match rule didn't exist (dbus#351, Simon McVittie) * On Windows, fix a race condition where dbus-run-session could start the wrapped application before the dbus-daemon was ready (dbus#297, Ralf Habacker) * Fix build with clang 13 by using Standard C offsetof where available (dbus!237, Simon McVittie) * Fix build of tests on FreeBSD (dbus!167, Simon McVittie) * Various CMake build improvements (dbus#310, dbus!213, dbus#319, dbus!217, dbus#346, dbus#356; Ralf Habacker) * Set IMPORTED_IMPLIB property in CMake metadata installed via Autotools with mingw toolchain (dbus!172, Julien Schueller) * Make documentation build more reproducible (dbus!189, dbus!238; Arnout Engelen, Simon McVittie) * On Unix, make X11 autolaunch cope with slashes in DISPLAY (dbus#8, dbus#311; William Earley) * Don't try to raise RLIMIT_NOFILE beyond OPEN_MAX on macOS (dbus#309, William Earley) * Improve SELinux audit messages (dbus!173, Chris PeBenito) * Validate various strings in dbus-send to avoid client-side assertion failures on invalid input (dbus#338, Simon McVittie) * Fix a memory leak in a unit test (dbus!208, David King) * In Autotools builds, use pkg-config in preference to AC_PATH_XTRA (dbus!212, Scott Hamilton) * On Windows, prevent (theoretical?) stack buffer overflow with very long paths (dbus!221, Ralf Habacker) * Fix build with newer mingw compilers (dbus#355, Ralf Habacker) * Various Windows error-handling fixes (dbus!229, dbus#357, dbus#279, dbus#360, dbus#365; Ralf Habacker, Simon McVittie) * Clearer diagnostics when tests are skipped (dbus#363, Simon McVittie) * CI improvements (dbus#318, dbus!197, dbus!187, dbus!196, dbus!201, dbus#359; Simon McVittie, Ralf Habacker, Arnout Engelen, Marc-André Lureau) * Typo fixes, etc. (dbus!183, dbus!182; Chigozirim Chukwu, Samy Mahmoudi) - Update to dbus 1.13.18 (2020-07-02) The “carnivorous border” release. Maybe security fixes: * On Unix, avoid a use-after-free if two usernames have the same numeric uid. In older versions this could lead to a crash (denial of service) or other undefined behaviour, possibly including incorrect authorization decisions if <policy group=...> is used. Like Unix filesystems, D-Bus' model of identity cannot distinguish between users of different names with the same numeric uid, so this configuration is not advisable on systems where D-Bus will be used. Thanks to Daniel Onaca. (dbus#305, dbus!166, CVE-2020-35512; Simon McVittie) Other fixes: * On Solaris and its derivatives, if a cmsg header is truncated, ensure that we do not overrun the buffer used for fd-passing, even if the kernel tells us to. (dbus#304, dbus!165; Andy Fiddaman) * When built with CMake, use GNUInstallDirs' special-cases for prefixes /, /usr and /opt/* (dbus!155, Ralf Habacker) * When built with CMake on Linux, allow systemd-specific features to be enabled, for feature parity with Autotools (dbus!155, Ralf Habacker) * When built with CMake, install the same example files as with Autotools (dbus!155, Ralf Habacker) * Correct the doc-comment for DBUS_ERROR_SPAWN_NO_MEMORY (dbus!163, Marc-André Lureau) - Update to dbus 1.13.16 (2020-06-02) The “ominous mushroom hat” release. Denial of service fixes: * CVE-2020-12049: If a message contains more file descriptors than can be sent, close those that did get through before reporting error. Previously, a local attacker could cause the system dbus-daemon (or another system service with its own DBusServer) to run out of file descriptors, by repeatedly connecting to the server and sending fds that would get leaked. Thanks to Kevin Backhouse of GitHub Security Lab. (dbus#294, GHSL-2020-057; Simon McVittie) Enhancements: * The API reference manual can be built as a Qt compiled help file if qhelpgenerator(-qt5) is available. This is controlled by --enable-qt-help and --with-qchdir in the Autotools build, or -DENABLE_QT_HELP and -DINSTALL_QCH_DIR in CMake. (dbus!150, Ralf Habacker) Fixes: * When built for Windows, return all autolaunch error information in the DBusError rather than printing some of it to stderr (dbus#191, dbus!131; Ralf Habacker) * When built for Windows, don't truncate long log messages (dbus!134, Ralf Habacker) * When built using CMake for a Unix platform, dbus-cleanup-sockets and dbus-uuidgen are now included (dbus!154, Ralf Habacker) * When built for Windows with verbose mode enabled, don't print debugging messages related to poll() emulation into a fixed-size buffer that could overflow (dbus!125, Ralf Habacker) * Adjust .desktop file parser to avoid a Coverity false positive (dbus!146, Coverity CID 354884; Ralf Habacker) * Print shell-test diagnostics to stderr, avoiding warnings or errors from strict TAP parsers (dbus!157, Félix Piédallu) Tests and CI enhancements: * When the CI cross-builds Windows binaries on Linux, run unit tests using Wine (dbus#296, dbus!158; Ralf Habacker) * Really build x86_64 Windows binaries in Gitlab-CI, instead of building i686 binaries a second time (Ralf Habacker) * When tests will be run using Wine, use STABS debug symbol format so that Wine can display backtraces (dbus#133, dbus!104; Ralf Habacker) - Update to dbus 1.13.14 (2020-04-21) The “mystery allium” release. Dependencies: * On Unix platforms, if getpwnam_r() and getgrnam_r() are implemented, they must be POSIX-conformant. The non-POSIX signature seen in ancient Solaris versions will no longer work. (dbus!11, Simon McVittie) Enhancements: * D-Bus Specification 0.36: · Fix a typo in an annotated hexdump of part of a message (dbus!152, Zygmunt Krynicki) * On Linux, use getrandom(2) in preference to /dev/urandom (dbus!147, Natanael Copa) * Add a --sender option to dbus-send, which requests a name and holds it until the signal has been sent. (dbus!116, Christopher Morin) Fixes: * Fix a crash when the dbus-daemon is terminated while one or more monitors are active (dbus#291, dbus!140; Simon McVittie) * Fix several test failures if the build-time tests were run as uid 0. Note that running the tests with elevated privileges is likely to be insecure, and should only be attempted in an expendable container or virtual machine. (dbus!117, Simon McVittie) * Fix an assertion failure if a client encounters an out-of-memory condition while sending its response to the "OK" authentication message, and processing of the "OK" message is subsequently retried when more memory is available (dbus!119, Simon McVittie) * Don't leak struct addrinfo if we run out of memory during a TCP connect() (dbus!143, dbus!144, Coverity CID 354880; Ralf Habacker, Simon McVittie) * On Linux with SELinux, don't assume that the system policy has the "dbus" security class or the associated AV (dbus#198, dbus!128; Laurent Bigonville) * Handle dbus_connection_set_change_sigpipe() in a thread-safe way (dbus!132; Simon McVittie, Ralf Habacker) * On Unix, use POSIX <poll.h> in preference to <sys/poll.h> (dbus!148, Natanael Copa) * When building with CMake, cope with libX11 in a non-standard location (dbus!129, Tuomo Rinne) * On Windows with verbose mode enabled and outputting to the debug port, use a dynamically-allocated buffer to avoid potential stack buffer overflows in long messages (dbus#45, dbus!133; Ralf Habacker) * The dbus-send(1) man page now documents --bus and --peer instead of the old --address synonym for --peer, which has been deprecated since the introduction of --bus and --peer in 1.7.6 (fd.o #48816, dbus!115; Chris Morin) * Fix a wrong environment variable name in dbus-daemon(1) (dbus#275, dbus!122; Mubin, Philip Withnall) * Fix formatting of dbus_message_append_args example (dbus!126, Felipe Franciosi) Internal changes: * Move more test-only code from dbus/ to tests/ (dbus!120, dbus!121, dbus!153; Simon McVittie) * Improve diagnostics if memory or fd leaks are detected (dbus!118, dbus!120; Simon McVittie) * Move from Debian 9 to Debian 10 for most continuous integration jobs (dbus!151, Simon McVittie) * On Windows, improve embedded version information (dbus!136, dbus!138, dbus!139; Ralf Habacker) * Indentation fixes (dbus!149, Taras Zaporozhets) - Update to dbus 1.13.12 (2019-06-11) The “patio squirrel” release. Security fixes: * CVE-2019-12749: Do not attempt to carry out DBUS_COOKIE_SHA1 authentication for identities that differ from the user running the DBusServer. Previously, a local attacker could manipulate symbolic links in their own home directory to bypass authentication and connect to a DBusServer with elevated privileges. The standard system and session dbus-daemons in their default configuration were immune to this attack because they did not allow DBUS_COOKIE_SHA1, but third-party users of DBusServer such as Upstart could be vulnerable. Thanks to Joe Vennix of Apple Information Security. (dbus#269, Simon McVittie) Enhancements: * dbus-daemon <allow> and <deny> rules can now specify a send_destination_prefix attribute, which is like a combination of send_destination and the arg0namespace keyword in match rules: a rule with send_destination_prefix="com.example.Foo" matches messages sent to any destination that is in the queue to own well-known names like com.example.Foo or com.example.Foo.A.B (but not com.example.Foobar). (dbus!85, Adrian Szyndela) - Update to dbus 1.13.10 (2019-05-13) The “engineering brick” release. Dependencies: * GLib >= 2.38 is required if full test coverage is enabled (reduced from 2.40 in dbus 1.12.x.) Deprecations: * Third-party software should install default dbus policies for the system bus into ${datadir}/dbus-1/system.d (this has been supported since dbus 1.10, released in August 2015). Installing default dbus policies in ${sysconfdir}/dbus-1/system.d is now considered to be deprecated. Policy files in ${sysconfdir}/dbus-1/system.d continue to be read, but this directory should only be used by system administrators wishing to override the default policies. The ${datadir} applicable to dbus is usually /usr/share and the ${sysconfdir} is usually /etc. * A similar pattern applies to the session bus policies in session.d. Enhancements: * D-Bus Specification 0.35: · Add UnixGroupIDs to GetConnectionCredentials() (dbus#196, dbus!105; Matthijs van Duin) · Remove some redundancies from the spec for interface names (dbus!102, Felipe Gasper) * Raise soft fd limit to match hard limit, even if unprivileged. This makes session buses with many clients, or with clients that make heavy use of fd-passing, less likely to suffer from fd exhaustion. (dbus!103, Simon McVittie) * On Linux 4.13 or later when built against a suitable glibc version, GetConnectionCredentials() now includes UnixGroupIDs, the effective group IDs of the initiator of the connection, taken from SO_PEERGROUPS. (dbus#196, dbus!105; Matthijs van Duin) * Embedded/special-purpose builds of dbus can now be configured with --disable-traditional-activation, to disable services being launched as a subprocess of the dbus-daemon. This allows the system dbus-daemon to be run in a more tightly restricted security profile (an example "drop-in" for systemd is provided). If systemd support is enabled, then services with a SystemdService configured can still be activated in these builds, via IPC to systemd. Otherwise, services will not be activatable at all. Please note that this option is not suitable for general-purpose Linux distributions that are intended to support running third-party D-Bus services. (dbus!107, Topi Miettinen) * Move CMake build system to top level, matching normal practice for CMake projects (dbus!84, Ralf Habacker) * Reformat CMake files (dbus#252, dbus!82, dbus!91; Ralf Habacker) * Avoid GLib 2.40 dependencies (dbus!79, Ralf Habacker) * Officially deprecate packaged XML policies in ${sysconfdir}, and document how to install system services correctly (dbus!76, Simon McVittie) * Add AddressSanitizer and ubsan support (dbus!57, Simon McVittie) Fixes: * If a privileged dbus-daemon has a hard fd limit greater than 64K, don't reduce it to 64K, ensuring that we can put back the original fd limits when carrying out traditional (non-systemd) activation. This fixes a regression with systemd >= 240 in which system services inherited dbus-daemon's hard and soft limit of 64K fds, instead of the intended soft limit of 1K and hard limit of 512K or 1M. (dbus!103, Debian#928877; Simon McVittie) * Fix build failures caused by an AX_CODE_COVERAGE API change in newer autoconf-archive versions (dbus#249, dbus!88; Simon McVittie) * Fix build failures with newer autoconf-archive versions that include AX_-prefixed shell variable names (dbus#249, dbus!86; Simon McVittie) * Avoid possible memory corruption in certain DBusHashTableIter use patterns, which in practice were never used (dbus!44, Simon McVittie) * Avoid a test failure on Linux when built in a container as uid 0, but without the necessary privileges to increase resource limits (dbus!58, Debian #908092; Simon McVittie) * Don't overwrite PKG_CONFIG_PATH and related environment variables when the pkg-config-based version of DBus1Config is used in a CMake project (dbus#267, dbus!96; Clemens Lang) * In CMake builds, respect GNUInstallDirs variables (dbus!77, Ralf Habacker) * In CMake builds, don't rebuild documentation every time (dbus!94, Ralf Habacker) * In CMake builds for Windows, don't require libiconv (dbus#262, dbus!100; Ralf Habacker) * Fix intermittent build failures with parallel CMake (dbus#266, dbus!113; Simon McVittie) * Don't assume we can set permissions on a directory, for the benefit of MSYS and Cygwin builds (dbus#216, dbus!110; Simon McVittie) * Avoid test failures with non-trivial NSS modules (dbus#256, dbus!93; Simon McVittie) * Fix test failures in test-syslog and test-sysdeps under Windows (dbus#238, dbus#243, dbus!61, dbus!62; Simon McVittie) * Ensure that CTest build-time tests on Windows use the just-built libdbus-1-3.dll (dbus!83, Ralf Habacker) * Don't take so long to run test-refs on Windows (dbus#244, dbus!65; Ralf Habacker) * Fix memory leaks in tests (dbus!68, Simon McVittie) * Avoid casting user-supplied pointers to DBusBasicValue *, which is formally undefined behaviour (dbus!69, Simon McVittie) * Fix a non-exploitable stack array overrun in dbus-run-session on Windows (Ralf Habacker) Tests and CI enhancements: * Verify that the result of an Autotools `make dist` can be used for a successful CMake build (dbus#255, dbus!87; Simon McVittie) * Rewrite Python tests into C to reduce circular dependencies and facilitate use of AddressSanitizer (dbus!37, Simon McVittie) * Refactor tests to extract most of their code from the bus/ and dbus/ directories, and break them up into smaller modules (dbus#223, dbus#240, dbus!1, dbus!99, dbus!73, dbus!74, dbus!75; Simon McVittie, Ralf Habacker) * Do CI builds in a more minimal environment (dbus!63, Simon McVittie) * Improve test coverage with CMake (dbus#135, dbus!23; Ralf Habacker) * Avoid firewall exception requests when running build-time tests on Windows (dbus!64, Ralf Habacker) * Allow use of Wine to run cross-compiled Windows tests on Linux (dbus!60, Ralf Habacker) Internal changes: * Rename DBusSocketSet to the more accurate DBusPollableSet (dbus!81, Ralf Habacker) * Refactor Windows implementation of dbus-spawn (dbus!80; Ralf Habacker, Simon McVittie) * Delete unused code from userdb module (dbus!92, Simon McVittie) * Remove unnecessary _dbus_threads_init_debug() (dbus!72, Simon McVittie) - Update to dbus 1.13.8 (2018-12-04) The “demanding dragon” release. dbus version control is now hosted on freedesktop.org's Gitlab installation, and bug reports and feature requests have switched from Bugzilla bugs (indicated by "fd.o #nnn") to Gitlab issues ("dbus#nnn") and merge requests ("dbus!nnn"). See README and CONTRIBUTING.md for more details. Dependencies: * dbus now requires at least a basic level of support for C99 variadic macros, as implemented in gcc >= 3, all versions of Clang, and MSVC >= 2005. In practice this requirement has existed since version 1.9.2, but it is now official. * dbus now requires a C99-compatible va_copy() macro (or a __va_copy() macro with the same behaviour), except when building for Windows using MSVC and CMake. * Building documentation using CMake now requires xsltproc, Docbook DTDs (for example docbook-xml on Debian derivatives), and Docbook XSLT stylesheets (for example docbook-xsl on Debian derivatives). Using KDE's meinproc4 documentation processor is no longer supported. Enhancements: * Rewrite CONTRIBUTING.md to reflect the current setup (dbus!8, Simon McVittie) * D-Bus Specification v0.34: · Fix an incorrect AddMatch() call in sample code (dbus#221, dbus!56; Philip Withnall) * Tarball releases no longer contain pre-2007 changelogs and are now compressed with xz, so they should be somewhat smaller (fd.o #107630; Francesco Turco, Simon McVittie) * Reference the freedesktop.org Code of Conduct (Simon McVittie) * Build an implementation of dbus-run-session for Windows (dbus#135, dbus!22; Ralf Habacker) * On Linux with SELinux, use avc_open() and monitor the AVC netlink fd in the main event loop, instead of using the deprecated avc_init() and a thread (dbus#134, dbus!31; Laurent Bigonville) * On Linux with SELinux, use the SELINUX_CB_POLICYRELOAD callback to detect policy reloads, instead of monitoring the access vector cache with AVC_CALLBACK_RESET (dbus#134, dbus!31; Laurent Bigonville) * Avoid double slashes in pkg-config paths (dbus!30, Ralf Habacker) * Improve test coverage and clean up dead code (fd.o #107739, dbus#222; Simon McVittie) * Allow --enable-relocation in combination with absolute paths for --exec-prefix, --libdir (fd.o #107662, Simon McVittie) * Don't run a test program to check how to copy a va_list, which is awkward for cross-compiling; instead require that va_copy() or __va_copy() exists, except in older MSVC versions where we already know that simple assignment is enough (dbus!35, Simon McVittie) * Simplify configure checks (dbus!10, Simon McVittie) * Improve CMake build system parity with Autotools, including: · Detect inotify, prctl() and getpwnam_r() correctly on Linux · Use xsltproc instead of meinproc4 for documentation (dbus#57, dbus#117, dbus#193, dbus#227, dbus!18, dbus!39; Ralf Habacker, Simon McVittie) Fixes: * Stop the dbus-daemon leaking memory (an error message) if delivering the message that triggered auto-activation is forbidden. This is technically a denial of service because the dbus-daemon will run out of memory eventually, but it's a very slow and noisy one, because all the rejected messages are also very likely to have been logged to the system log, and its scope is typically limited by the finite number of activatable services available. (dbus#234, Simon McVittie) * Remove __attribute__((__malloc__)) attribute on dbus_realloc(), which does not meet the criteria for that attribute in gcc 4.7+, potentially leading to miscompilation (fd.o #107741, Simon McVittie) * Parse section/group names in .service files according to the syntax from the Desktop Entry Specification: · reject control characters and non-ASCII in section/group names · backslash escapes are not interpreted in section/group names (dbus#208; David King, Simon McVittie) * Always use select()-based poll() emulation on Darwin-based OSs (macOS, etc.) and on Interix, similar to what libcurl does (dbus#232, dbus!19; Simon McVittie) * Avoid undefined integer shifts when generating random tokens for the DBUS_COOKIE_SHA1 mechanism (dbus!45, Simon McVittie) * Document the max-connections-per-user limit as unimplemented on Windows, and don't fail tests when it isn't enforced there (dbus!54, Simon McVittie) * Avoid unnecessary file descriptors being inherited by dbus-daemon and dbus-launch subprocesses (dbus!50, Simon McVittie) * Fix some minor memory leaks (fd.o #107320, dbus!41, dbus!42; Simon McVittie) * Don't fail tests if GetConnectionUnixProcessID() succeeds on Windows, which it normally will since 1.7.x (dbus#239, dbus!55; Simon McVittie) * Extend a test timeout to avoid spurious failures in CI (dbus!26, Simon McVittie) * Avoid undefined signed integer operations when generating random message content during regression tests (dbus!46, Simon McVittie) * Fix build warnings with recent gcc (dbus#208, dbus#225; David King) * Fix build warnings without libX11 (dbus#228, Simon McVittie) * Fix whitespace and error behaviour for _dbus_command_from_pid() (dbus#222, dbus!28; Simon McVittie) * Fix a race condition in the containers test (dbus!47, Simon McVittie) * When built with CMake, install dbus-daemon-launch-helper to ${CMAKE_INSTALL_LIBEXECDIR}, analogous to ${libexecdir} in Autotools (dbus!9, Simon McVittie) * When built with CMake and disabling tests, still install dbus-daemon-launch-helper (dbus!9, Simon McVittie) Tests and CI: * Add Travis-CI builds for 64-bit Windows using mingw-w64 (fd.o #105662, Ralf Habacker) * Add Gitlab-CI integration (fd.o #108177, Simon McVittie) - Update to dbus 1.13.6 (2018-08-02) The “vine cutting” release. Fixes: * Prevent reading up to 3 bytes beyond the end of a truncated message. This could in principle be an information leak or denial of service on the system bus, but is not believed to be exploitable to crash the system bus or leak interesting information in practice. (fd.o #107332, Simon McVittie) * Fix build with gcc 8 -Werror=cast-function-type (fd.o #107349, Simon McVittie) * Fix warning from gcc 8 about suspicious use of strncpy() when populating struct sockaddr_un (fd.o #107350, Simon McVittie) * Fix a minor memory leak when a DBusServer listens on a new address (fd.o #107194, Simon McVittie) * Fix an invalid NULL argument to rmdir() if a nonce-tcp DBusServer runs out of memory (fd.o #107194, Simon McVittie) * Fix various memory leaks during unit tests (fd.o #107194, Simon McVittie) * Don't use misleading errno-derived error names if getaddrinfo() or getnameinfo() fails with a code other than EAI_SYSTEM (fd.o #106395, Simon McVittie) * Skip tests that require working TCP if we are in a container environment where 127.0.0.1 cannot be resolved (fd.o #106812, Simon McVittie) - Update to dbus 1.13.4 (2018-04-30) The “parsimonious topping” release. Dependencies: * All Windows builds now require Windows Vista or later. (Note that we do not recommend or support use of dbus on operating systems outside their vendor's security support lifetime, such as Vista.) Enhancements: * D-Bus Specification v0.33 · Be clearer about the security properties of TCP transports, which have no integrity or confidentiality protection and so should not normally be used, except via the loopback interface on Windows (fd.o #106004, Simon McVittie) * On Linux 4.13 or later, <policy group="…"> now uses the SO_PEERGROUPS credentials-passing socket option to get the effective group IDs of the initiator of the connection. On platforms where that socket option is not available, dbus-daemon continues to look up the connection's user ID in the system user and group databases and assume that it has the groups that would have been granted by initgroups(). (fd.o #103737, #97821; Simon McVittie) * If the dbus-daemon is compiled for Linux with systemd support, it now informs systemd that it is ready for use via the sd_notify() mechanism. (fd.o #104641; Michal Sekletar, Simon McVittie) * Several environment variables set by systemd are no longer passed on to activated services (fd.o #104641, Simon McVittie) * Failing to bind a TCP socket to an address produces better error messages. (fd.o #61922; Simon McVittie, Ralf Habacker) * Windows builds now set the SO_REUSEADDR and TCP_NODELAY options on TCP sockets (as Unix builds already did), which should improve robustness and performance (fd.o #61922, Ralf Habacker) * Windows executables built with cmake have version information. When building for Windows with Autotools, only libdbus-1-3.dll has version information, matching previous behaviour with cmake. (fd.o #103387, Ralf Habacker) * The Devhelp documentation index is now in version 2 format (fd.o #106186, Simon McVittie) * Give the dbus-daemon man page some scarier warnings about <allow_anonymous/> and non-local TCP, which are insecure and should not be used, particularly for the standard system and session buses (fd.o #106004, Simon McVittie) Fixes: * Listening on TCP sockets copes better with IPv6 being disabled (fd.o #61922; Ralf Habacker, Simon McVittie) * Fix installation of Ducktype documentation with newer yelp-build versions (fd.o #106171, Simon McVittie) * Fix printf formats for pointer-sized integers on 64-bit Windows (fd.o #105662, Ralf Habacker) Internal changes: * The _DBUS_GNUC_WARN_UNUSED_RESULT macro has been replaced with _DBUS_WARN_UNUSED_RESULT, which is effective with gcc, clang and MSVC (with cl.exe /analyze). Note that for MSVC compatibility, it must appear before the return type in function declarations, whereas the older macro could also have appeared after the arguments. (fd.o #105460; Daniel Wendt, Ralf Habacker) - Update to dbus 1.13.2 (2018-03-01) The “can break a man's arm” release. Enhancements: * When a container manager creates an extra server at runtime, services can now request that messages from connections to that server are tagged with the container instance ID, providing a fast-path for identifying such connections. (fd.o #101899, Simon McVittie) Fixes: * Increase system dbus-daemon's RLIMIT_NOFILE rlimit before it drops privileges, because it won't have permission afterwards. This fixes a regression in dbus 1.10.18 and 1.11.0 which made the standard system bus more susceptible to deliberate or accidental denial of service. (fd.o #105165, David King) - Update to dbus 1.13.0 (2018-02-08) The “Citispeed Eco 75” release. This is a new development branch for the adventurous, and comes with a risk of regressions. OS distributions should stay with the 1.12.x branch, unless they can commit to following the 1.13.x branch until it reaches a 1.14.0 stable release at an unspecified point in the future. In particular, the new Containers API is subject to change and shouldn't be enabled in distributions yet, even those aimed at early adopters (hello, Arch Linux). Behaviour changes: * DBusServer (and hence the dbus-daemon) no longer accepts usernames (login names) for the recommended EXTERNAL authentication mechanism, only numeric user IDs or the empty string. This is not believed to affect real D-Bus clients in practice, because most D-Bus clients send numeric user IDs: the only known client implementation that sends usernames is dbus-java, and that only when run on a system where the com.sun.security.auth.module.UnixSystem.getUid() method is not available. (fd.o #104588, Simon McVittie) Enhancements: * D-Bus Specification v0.32 · Deprecate hyphen/minus in reversed domain names, recommending underscores instead. Recommend prepending an underscore to domain components that start with a digit, which would not be allowed. (fd.o #103914, Simon McVittie) · Clarify how the SASL authentication handshake works (fd.o #104224, Simon McVittie) · Recommend that the message bus should remove message header fields that it does not understand. The new item "HeaderFiltering" in the message bus' Features property indicates that it promises to do so. (fd.o #100317, Simon McVittie) * Add experimental support for creating extra servers at runtime, to be used by app containers like Flatpak or Snap. This API is still subject to change and is not compiled in by default. (fd.o #101354, Simon McVittie) * Improve automated test logging (fd.o #103601, Simon McVittie) * The dbus-daemon now filters the messages that it relays, removing header fields that it does not understand. Clients must not rely on this behaviour unless they have confirmed that they are connected to a suitable message bus implementation, for example by querying its Features property. (fd.o #100317, Simon McVittie) Fixes: * When iterating the DBusConnection while blocking on a pending call, don't wait for I/O if that pending call already has a result; and make sure that whether it has a result is propagated in a thread-safe way. This prevents certain multi-threaded calling patterns from blocking until their timeout even when they should have succeeded sooner. (fd.o #102839; Manish Narang, Michael Searle) * Do not look up client-supplied strings in the system user database (NSS or equivalent) when using the recommended EXTERNAL auth mechanism. This could previously lead to a deadlock or timeout in the presence of slow or network-dependent NSS modules. (fd.o #104588, Simon McVittie) * Report the correct error if OOM is reached while trying to listen on a TCP socket (fd.o #89104, Simon McVittie) * Fix a crash and an assertion failure in the server side of the nonce-tcp: transport under error conditions (fd.o #89104, Simon McVittie) * Fix assertion failures in recovery from OOM while setting up a DBusServer (fd.o #89104, Simon McVittie) * Don't leak a file descriptor if setting up a launchd server fails (fd.o #89104, Simon McVittie) * Add a missing space to a warning message (fd.o #103729, Thomas Zajic) * Fix some memory leaks in automated tests (fd.o #103600, Simon McVittie) * Expand ${bindir} correctly when pkg-config is asked for dbus_daemondir (fd.o #104265, Benedikt Heine) * On Linux systems with systemd < 237, if ${localstatedir}/lib/dbus doesn't exist, create it before trying to create ${localstatedir}/lib/dbus/machine-id (fd.o #104577, Chris Lesiak) * Fix escaping in dbus-api-design document (fd.o #104925, Philip Withnall) Internal changes: * Harden the nonce-tcp: transport against resource leaks and use-after-free (fd.o #103597, Simon McVittie) * Make _DBUS_STRING_DEFINE_STATIC more consistent with _dbus_string_init_const() (fd.o #89104, Simon McVittie) * Add _DBUS_STRING_INIT_INVALID, analogous to NULL, and use it to simplify error unwinding code paths (fd.o #89104, Simon McVittie) * Make the behaviour of _dbus_string_init_const()/_dbus_string_free() consistent with _dbus_string_init()/_dbus_string_free(): it now clears the string to _DBUS_STRING_INIT_INVALID, whereas previously it left the string untouched (fd.o #89104, Simon McVittie) * Remove automated test data for wire protocol version 0, which has not been supported since 2005 (fd.o #103758, Simon McVittie) * Simplify method calls in automated tests (fd.o #103600, Simon McVittie) ------------------------------------------------------------------- Wed Nov 9 14:53:47 UTC 2022 - Ralf Habacker <ralf.habacker@freenet.de> - Drop unused build dependencies to fix building on Tumbleweed - Drop obsolete build dependencies (boo#1201119) ------------------------------------------------------------------- Mon Jan 10 10:35:34 UTC 2022 - Ralf Habacker <ralf.habacker@freenet.de> - Add runtime package as dependency to development package to fix running cross compiled application (boo#1194430) ------------------------------------------------------------------- Fri Dec 3 09:13:25 UTC 2021 - Ralf Habacker <ralf.habacker@freenet.de> - Change all version comparisons for Tumbleweed to >= 1550 (instead of == 1550). Anything in Tumbleweed counts for current Tumbleweed plus future CODE branches. Additionally, the Tumbleweed suse_version code is not chiseled in stone. ------------------------------------------------------------------- Sat Jul 18 08:46:02 UTC 2020 - Ralf Habacker <ralf.habacker@freenet.de> - Update to dbus 1.12.20 * On Unix, avoid a use-after-free if two usernames have the same numeric uid. In older versions this could lead to a crash (denial of service) or other undefined behaviour, possibly including incorrect authorization decisions if <policy group=...> is used. Like Unix filesystems, D-Bus' model of identity cannot distinguish between users of different names with the same numeric uid, so this configuration is not advisable on systems where D-Bus will be used. Thanks to Daniel Onaca. (dbus#305, dbus!166; Simon McVittie) * On Solaris and its derivatives, if a cmsg header is truncated, ensure that we do not overrun the buffer used for fd-passing, even if the kernel tells us to. (dbus#304, dbus!165; Andy Fiddaman) - From 1.12.18 * CVE-2020-12049: If a message contains more file descriptors than can be sent, close those that did get through before reporting error. Previously, a local attacker could cause the system dbus-daemon (or another system service with its own DBusServer) to run out of file descriptors, by repeatedly connecting to the server and sending fds that would get leaked. Thanks to Kevin Backhouse of GitHub Security Lab. (dbus#294, GHSL-2020-057; Simon McVittie) * Fix a crash when the dbus-daemon is terminated while one or more monitors are active (dbus#291, dbus!140; Simon McVittie) * The dbus-send(1) man page now documents --bus and --peer instead of the old --address synonym for --peer, which has been deprecated since the introduction of --bus and --peer in 1.7.6 (fd.o #48816, dbus!115; Chris Morin) * Fix a wrong environment variable name in dbus-daemon(1) (dbus#275, dbus!122; Mubin, Philip Withnall) * Fix formatting of dbus_message_append_args example (dbus!126, Felipe Franciosi) * Avoid a test failure on Linux when built in a container as uid 0, but without the necessary privileges to increase resource limits (dbus!58, Debian #908092; Simon McVittie) * When building with CMake, cope with libX11 in a non-standard location (dbus!129, Tuomo Rinne) - From 1.12.16 * CVE-2019-12749: Do not attempt to carry out DBUS_COOKIE_SHA1 authentication for identities that differ from the user running the DBusServer. Previously, a local attacker could manipulate symbolic links in their own home directory to bypass authentication and connect to a DBusServer with elevated privileges. The standard system and session dbus-daemons in their default configuration were immune to this attack because they did not allow DBUS_COOKIE_SHA1, but third-party users of DBusServer such as Upstart could be vulnerable. Thanks to Joe Vennix of Apple Information Security. (dbus#269, Simon McVittie) ------------------------------------------------------------------- Tue Jun 9 20:29:29 UTC 2020 - Ralf Habacker <ralf.habacker@freenet.de> - Use python3 instead of python2 to fix building on Tumbleweed ------------------------------------------------------------------- Wed Nov 20 13:40:31 UTC 2019 - Ludwig Nussel <lnussel@suse.de> - inital package for Factory submission
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor