Commit Graph

18 Commits

Author SHA1 Message Date
Adolf Belka
6d144d259f dbus: Update to version 1.14.4
- Update from version 1.14.0 to 1.14.4
- Update of rootfile
- Changelog
    dbus 1.14.4 (2022-10-05)
     This is a security update for the dbus 1.14.x stable branch, fixing
     denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying
     security hardening (dbus#416).
	Behaviour changes:
		• On Linux, dbus-daemon and other uses of DBusServer now create a
		  path-based Unix socket, unix:path=..., when asked to listen on a
		  unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to
		  unix:dir=... on all platforms.
		  Previous versions would have created an abstract socket, unix:abstract=...,
		  in this situation.
		  This change primarily affects the well-known session bus when run via
		  dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring
		  dbus with --enable-user-session and running it on a systemd system,
		  already used path-based Unix sockets and is unaffected by this change.
		  This behaviour change prevents a sandbox escape via the session bus socket
		  in sandboxing frameworks that can share the network namespace with the host
		  system, such as Flatpak.
		  This change might cause a regression in situations where the abstract socket
		  is intentionally shared between the host system and a chroot or container,
		  such as some use-cases of schroot(1). That regression can be resolved by
		  using a bind-mount to share either the D-Bus socket, or the whole /tmp
		  directory, with the chroot or container.
		  (dbus#416, Simon McVittie)
	Denial of service fixes:
		Evgeny Vereshchagin discovered several ways in which an authenticated
		local attacker could cause a crash (denial of service) in
		dbus-daemon --system or a custom DBusServer. In uncommon configurations
		these could potentially be carried out by an authenticated remote attacker.
		• An invalid array of fixed-length elements where the length of the array
		  is not a multiple of the length of the element would cause an assertion
		  failure in debug builds or an out-of-bounds read in production builds.
		  This was a regression in version 1.3.0.
		  (dbus#413, CVE-2022-42011; Simon McVittie)
		• A syntactically invalid type signature with incorrectly nested parentheses
		  and curly brackets would cause an assertion failure in debug builds.
		  Similar messages could potentially result in a crash or incorrect message
		  processing in a production build, although we are not aware of a practical
		  example. (dbus#418, CVE-2022-42010; Simon McVittie)
		• A message in non-native endianness with out-of-band Unix file descriptors
		  would cause a use-after-free and possible memory corruption in production
		  builds, or an assertion failure in debug builds. This was a regression in
		  version 1.3.0. (dbus#417, CVE-2022-42012; Simon McVittie)
    dbus 1.14.2 (2022-09-26)
	Fixes:
		• Fix build failure on FreeBSD (dbus!277, Alex Richardson)
		• Fix build failure on macOS with launchd enabled
		  (dbus!287, Dawid Wróbel)
		• Preserve errno on failure to open /proc/self/oom_score_adj
		  (dbus!285, Gentoo#834725; Mike Gilbert)
		• On Linux, don't log warnings if oom_score_adj is read-only but does not
		  need to be changed (dbus!291, Simon McVittie)
		• Slightly improve error-handling for inotify
		  (dbus!235, Simon McVittie)
		• Don't crash if dbus-daemon is asked to watch more than 128 directories
		  for changes (dbus!302, Jan Tojnar)
		• Autotools build system fixes:
			  · Don't treat --with-x or --with-x=yes as a request to disable X11,
			    fixing a regression in 1.13.20. Instead, require X11 libraries and
			    fail if they cannot be detected. (dbus!263, Lars Wendler)
			  · When a CMake project uses an Autotools-built libdbus in a
			    non-standard prefix, find dbus-arch-deps.h successfully
			    (dbus#314, Simon McVittie)
			  · Don't include generated XML catalog in source releases
			    (dbus!317, Jan Tojnar)
			  · Improve robustness of detecting gcc __sync atomic builtins
			    (dbus!320, Alex Richardson)
		• CMake build system fixes:
			  · Detect endianness correctly, fixing interoperability with other D-Bus
			    implementations on big-endian systems (dbus#375, Ralf Habacker)
			  · When building for Unix, install session and system bus setup
			    in the intended locations
			    (dbus!267, dbus!297; Ralf Habacker, Alex Richardson)
			  · Detect setresuid() and getresuid() (dbus!319, Alex Richardson)
			  · Detect backtrace() on FreeBSD (dbus!281, Alex Richardson)
			  · Don't include headers from parent directory (dbus!282, Alex Richardson)
			  · Distinguish between host and target TMPDIR when cross-compiling
			    (dbus!279, Alex Richardson)
			  · Fix detection of atomic operations (dbus!306, Alex Richardson)
		Tests and CI enhancements:
			• On Unix, skip tests that switch uid if run in a container that is
			  unable to do so, instead of failing (dbus#407, Simon McVittie)
			• Use the latest MSYS2 packages for CI
			  (Ralf Habacker, Simon McVittie)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-12-26 08:43:27 +00:00
Michael Tremer
c183124f58 Bump PAK_VER for all packages that use SERVICES
Since we have extended services.cgi that it reads the Services field
from the Pakfire metadata, we will need to make sure that that metadata
is going to be on those systems.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-09-15 10:43:54 +00:00
Peter Müller
336a2a2e25 dbus: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-01 20:36:35 +00:00
Adolf Belka
6fd8dd43b6 dbus: Update to version 1.14.0
- Update from 1.12.20 to 1.14.0
- Update of rootfile
- Changelog
   1.14.x is a new stable branch, superseding 1.12.x.
   Summary of major changes between 1.12.x and 1.14.0
     Dependencies:
	• dbus now requires at least a basic level of support for C99 variadic
	  macros, as implemented in gcc >= 3, all versions of Clang, and
	  MSVC >= 2005. In practice this requirement has existed since version
	  1.9.2, but it is now official.
	• dbus now requires a C99-compatible va_copy() macro (or a __va_copy()
	  macro with the same behaviour), except when building for Windows using
	  MSVC and CMake.
	• On Unix platforms, if getpwnam_r() and getgrnam_r() are implemented,
	  they must be POSIX-conformant. The non-POSIX signature seen in ancient
	  Solaris versions will no longer work.
	• All Windows builds now require Windows Vista or later.
	  (Note that we do not recommend or support use of dbus on operating
	  systems outside their vendor's security support lifetime, such as Vista.)
	• GLib >= 2.38 is required if full test coverage is enabled
	  (reduced from 2.40 in dbus 1.12.x.)
	• Building using CMake now requires CMake 3.4.
	• Building documentation using CMake now requires xsltproc, Docbook DTDs
	  (for example docbook-xml on Debian derivatives), and Docbook XSLT
	  stylesheets (for example docbook-xsl on Debian derivatives). Using
	  KDE's meinproc4 documentation processor is no longer supported.
     Build-time configuration changes:
	• Move CMake build system to top level, matching normal practice for
	  CMake projects
     Deprecations:
        **Looking through these I don't believe they will cause a problem as they are
          deprecations and not yet removed.In the future if needed we might need to set
          datadir to /etc to keep the location the same as with syscondir. This won't be
          needed if we don't use the system.d directory for dbus policies.
	• Third-party software should install default dbus policies for the system
	  bus into ${datadir}/dbus-1/system.d (this has been supported since dbus
	  1.10, released in August 2015). Installing default dbus policies in
	  ${sysconfdir}/dbus-1/system.d is now considered to be deprecated. Policy
	  files in ${sysconfdir}/dbus-1/system.d continue to be read, but this
	  directory should only be used by system administrators wishing to
	  override the default policies.
	  The ${datadir} applicable to dbus is usually /usr/share and the
	  ${sysconfdir} is usually /etc.
	• A similar pattern applies to the session bus policies in session.d.
	• The dbus-send(1) man page now documents --bus and --peer instead of
	  the old --address synonym for --peer, which has been deprecated since
	  the introduction of --bus and --peer in 1.7.6
	• The dbus-daemon man page now has scarier warnings about
	  <allow_anonymous/> and non-local TCP, which are insecure and should
	  not be used, particularly for the standard system and session buses
	• DBusServer (and hence the dbus-daemon) no longer accepts usernames
	  (login names) for the recommended EXTERNAL authentication mechanism,
	  only numeric user IDs or the empty string. See 1.13.0 release notes
	  for full details.
     New features:
	• On Linux 4.13 or later when built against a suitable glibc version,
	  GetConnectionCredentials() now includes UnixGroupIDs, the effective
	  group IDs of the initiator of the connection, taken from
	  SO_PEERGROUPS.
	• On Linux 4.13 or later, <policy group="…"> now uses the SO_PEERGROUPS
	  credentials-passing socket option to get the effective group IDs
	  of the initiator of the connection. See 1.13.4 release notes for details.
	• Add a --sender option to dbus-send, which requests a name and holds it
	  until the signal has been sent
	• dbus-daemon <allow> and <deny> rules can now specify a
	  send_destination_prefix attribute, which is like a combination of
	  send_destination and the arg0namespace keyword in match rules.
	  See 1.13.12 release notes for more details
	• The dbus-daemon now filters the messages that it relays, removing
	  header fields that it does not understand. Clients must not rely on
	  this behaviour unless they have confirmed that they are connected to
	  a suitable message bus implementation, for example by querying its
	  Features property.
	• The dbus-daemon now emits a signal, ActivatableServicesChanged, when
	  the list of activatable services may have changed. Support for this
	  signal can be discovered by querying the Features property.
	• It is now possible to disable traditional (non-systemd) service
	  activation at build-time (Autotools: --disable-traditional-activation,
	  CMake: -DENABLE_TRADITIONAL_ACTIVATION=OFF). See 1.13.10 release notes
	  for details.
	• The API reference manual can be built as a Qt compiled help file if
	  qhelpgenerator(-qt5) is available. See 1.13.16 release notes for details.
     Miscellaneous behaviour changes:
	• When using the "user bus" (--enable-user-session), put the dbus-daemon
	  in the session slice
	• Several environment variables set by systemd are no longer passed
	  on to activated services
	• If the dbus-daemon is compiled for Linux with systemd support, it
	  now informs systemd that it is ready for use via the sd_notify()
	  mechanism
	• Tarball releases no longer contain pre-2007 changelogs and are now
	  compressed with xz, making them around 35% smaller.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-10 10:56:35 +00:00
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Peter Müller
66c3619872 Early spring clean: Remove trailing whitespaces, and correct licence headers
Bumping across one of our scripts with very long trailing whitespaces, I
thought it might be a good idea to clean these up. Doing so, some
missing or inconsistent licence headers were fixed.

There is no need in shipping all these files en bloc, as their
functionality won't change.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-18 23:54:57 +00:00
Robin Roevens
f15707c78c buildprocess: Add extra metadata to pak lfs files
* Add a Summary and Services field to all pak lfs files
* Replace occurances of INSTALL_INITSCRIPT with new INSTALL_INITSCRIPTS
  macro in all pak lfs files.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-11 15:13:15 +00:00
Michael Tremer
f8447c9d23 dbus: Add reload to initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-07-23 06:15:23 +00:00
Adolf Belka
5bc11f39e3 dbus: Update to 1.12.20
- Update dbus from 1.11.12 to 1.12.20 (latest in release line
	1.13.x is also available but this is the development line
	and not recommended for production use
- Changelog between these two versions is very long (750 lines long) and
	can be found in the NEWS file in the source tarball.
- rootfile updated

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-01 10:31:29 +00:00
Michael Tremer
2dc2a27803 lfs: Drop quotes in DEPS variable
Not sure why this has ever been there. This simply makes it
nicer to read and edit because we can have line-breaks now.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-24 08:57:27 +00:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Michael Tremer
778979f630 dbus: Update to 1.11.12
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-11 14:23:54 +01:00
Jonatan Schlag
41e5aa4a88 dbus: move initscript to src/initscripts/packages and use new macro
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
2017-03-03 15:06:55 +01:00
Michael Tremer
265f6b972f dbus: Fix compiling with newer glibc. 2012-08-07 11:28:52 +02:00
Arne Fitzenreiter
2c1b94f009 Add blootooth stack and experimental bluetooth cellphone/modem for red 2008-08-13 05:57:37 +02:00
ms
e989d2d914 Hwinfo-Hardwareerkennung entfernt.
Alte Paketdateien entfernt, da der Packager neu geschrieben wird.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@505 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-04-28 09:01:53 +00:00
ms
c5568d645a hwinfo in den Installer gebracht.
(Erstmal nur in das Image...)


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@446 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-03-11 20:20:29 +00:00
ms
93afd047ad HWInfo wieder eingefuegt, da mit kudzu zu viele Segmentation Faults liefert.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@443 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-03-07 18:42:02 +00:00