From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] dbus: Update to version 1.14.4 Date: Sun, 11 Dec 2022 13:33:23 +0100 Message-ID: <20221211123330.5155-2-adolf.belka@ipfire.org> In-Reply-To: <20221211123330.5155-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4802294032937105454==" List-Id: --===============4802294032937105454== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable - Update from version 1.14.0 to 1.14.4 - Update of rootfile - Changelog dbus 1.14.4 (2022-10-05) This is a security update for the dbus 1.14.x stable branch, fixing denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying security hardening (dbus#416). Behaviour changes: =E2=80=A2 On Linux, dbus-daemon and other uses of DBusServer now create a path-based Unix socket, unix:path=3D..., when asked to listen on a unix:tmpdir=3D... address. This makes unix:tmpdir=3D... equivalent to unix:dir=3D... on all platforms. Previous versions would have created an abstract socket, unix:abstract=3D= ..., in this situation. This change primarily affects the well-known session bus when run via dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuri= ng dbus with --enable-user-session and running it on a systemd system, already used path-based Unix sockets and is unaffected by this change. This behaviour change prevents a sandbox escape via the session bus socket in sandboxing frameworks that can share the network namespace with the ho= st system, such as Flatpak. This change might cause a regression in situations where the abstract soc= ket is intentionally shared between the host system and a chroot or container, such as some use-cases of schroot(1). That regression can be resolved by using a bind-mount to share either the D-Bus socket, or the whole /tmp directory, with the chroot or container. (dbus#416, Simon McVittie) Denial of service fixes: Evgeny Vereshchagin discovered several ways in which an authenticated local attacker could cause a crash (denial of service) in dbus-daemon --system or a custom DBusServer. In uncommon configurations these could potentially be carried out by an authenticated remote attacker. =E2=80=A2 An invalid array of fixed-length elements where the length of the= array is not a multiple of the length of the element would cause an assertion failure in debug builds or an out-of-bounds read in production builds. This was a regression in version 1.3.0. (dbus#413, CVE-2022-42011; Simon McVittie) =E2=80=A2 A syntactically invalid type signature with incorrectly nested pa= rentheses and curly brackets would cause an assertion failure in debug builds. Similar messages could potentially result in a crash or incorrect message processing in a production build, although we are not aware of a practical example. (dbus#418, CVE-2022-42010; Simon McVittie) =E2=80=A2 A message in non-native endianness with out-of-band Unix file des= criptors would cause a use-after-free and possible memory corruption in production builds, or an assertion failure in debug builds. This was a regression in version 1.3.0. (dbus#417, CVE-2022-42012; Simon McVittie) dbus 1.14.2 (2022-09-26) Fixes: =E2=80=A2 Fix build failure on FreeBSD (dbus!277, Alex Richardson) =E2=80=A2 Fix build failure on macOS with launchd enabled (dbus!287, Dawid Wr=C3=B3bel) =E2=80=A2 Preserve errno on failure to open /proc/self/oom_score_adj (dbus!285, Gentoo#834725; Mike Gilbert) =E2=80=A2 On Linux, don't log warnings if oom_score_adj is read-only but do= es not need to be changed (dbus!291, Simon McVittie) =E2=80=A2 Slightly improve error-handling for inotify (dbus!235, Simon McVittie) =E2=80=A2 Don't crash if dbus-daemon is asked to watch more than 128 direct= ories for changes (dbus!302, Jan Tojnar) =E2=80=A2 Autotools build system fixes: =C2=B7 Don't treat --with-x or --with-x=3Dyes as a request to disable X1= 1, fixing a regression in 1.13.20. Instead, require X11 libraries and fail if they cannot be detected. (dbus!263, Lars Wendler) =C2=B7 When a CMake project uses an Autotools-built libdbus in a non-standard prefix, find dbus-arch-deps.h successfully (dbus#314, Simon McVittie) =C2=B7 Don't include generated XML catalog in source releases (dbus!317, Jan Tojnar) =C2=B7 Improve robustness of detecting gcc __sync atomic builtins (dbus!320, Alex Richardson) =E2=80=A2 CMake build system fixes: =C2=B7 Detect endianness correctly, fixing interoperability with other D= -Bus implementations on big-endian systems (dbus#375, Ralf Habacker) =C2=B7 When building for Unix, install session and system bus setup in the intended locations (dbus!267, dbus!297; Ralf Habacker, Alex Richardson) =C2=B7 Detect setresuid() and getresuid() (dbus!319, Alex Richardson) =C2=B7 Detect backtrace() on FreeBSD (dbus!281, Alex Richardson) =C2=B7 Don't include headers from parent directory (dbus!282, Alex Richa= rdson) =C2=B7 Distinguish between host and target TMPDIR when cross-compiling (dbus!279, Alex Richardson) =C2=B7 Fix detection of atomic operations (dbus!306, Alex Richardson) Tests and CI enhancements: =E2=80=A2 On Unix, skip tests that switch uid if run in a container that is unable to do so, instead of failing (dbus#407, Simon McVittie) =E2=80=A2 Use the latest MSYS2 packages for CI (Ralf Habacker, Simon McVittie) Signed-off-by: Adolf Belka --- config/rootfiles/packages/dbus | 2 +- lfs/dbus | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/config/rootfiles/packages/dbus b/config/rootfiles/packages/dbus index 82817a942..3f752c21e 100644 --- a/config/rootfiles/packages/dbus +++ b/config/rootfiles/packages/dbus @@ -40,7 +40,7 @@ usr/bin/dbus-uuidgen #usr/lib/libdbus-1.la #usr/lib/libdbus-1.so usr/lib/libdbus-1.so.3 -usr/lib/libdbus-1.so.3.32.0 +usr/lib/libdbus-1.so.3.32.1 #usr/lib/pkgconfig/dbus-1.pc usr/libexec/dbus-daemon-launch-helper #usr/share/dbus-1 diff --git a/lfs/dbus b/lfs/dbus index 9e80718e4..9aceceb08 100644 --- a/lfs/dbus +++ b/lfs/dbus @@ -26,7 +26,7 @@ include Config =20 SUMMARY =3D D-Bus Message Bus System =20 -VER =3D 1.14.0 +VER =3D 1.14.4 =20 THISAPP =3D dbus-$(VER) DL_FILE =3D $(THISAPP).tar.xz @@ -34,7 +34,7 @@ DL_FROM =3D $(URL_IPFIRE) DIR_APP =3D $(DIR_SRC)/$(THISAPP) TARGET =3D $(DIR_INFO)/$(THISAPP) PROG =3D dbus -PAK_VER =3D 7 +PAK_VER =3D 8 =20 DEPS =3D =20 @@ -48,7 +48,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_BLAKE2 =3D ae0ebc2779e840e2d83f633029f81fba0e35969648dddce0280640= dd9bee3f9508aa7fb6aef696d1c4c56d40f91b754941f847525afaee5cc3170ad23a7eddbf +$(DL_FILE)_BLAKE2 =3D 7da5cd8f09eaef7a64f35f8ccbeb81c5687b3fad02d6ac05dd4c23= 2e0f731dbcf4c76c36b615e6216815c8f8631bf9cb32543665440153a1199b1b35922cdda4 =20 install : $(TARGET) =20 --=20 2.38.1 --===============4802294032937105454==--