Change logs for dbus source package in Vivid

  • dbus (1.8.12-1ubuntu5) vivid; urgency=medium
    
      * Add debian/patches/dont-stop-dbus.patch: Don't stop D-Bus in the service
        unit (see patch header and upstream bug for details). Fixes various causes
        of shutdown hangs, particularly with remote file systems. (LP: #1438612)
     -- Martin Pitt <email address hidden>   Tue, 31 Mar 2015 18:46:06 +0200
  • dbus (1.8.12-1ubuntu4) vivid; urgency=medium
    
      * debian/patches/ensure-dbus-machine-id.patch:
        - ensure that we have /var/lib/dbus/machine-id on user's system as some
          third-parties application relies on that file. It will only copy
          /etc/machine-id the file is not present already.
     -- Didier Roche <email address hidden>   Thu, 19 Mar 2015 15:19:02 +0100
  • dbus (1.8.12-1ubuntu3) vivid; urgency=medium
    
      * Install dbus into /usr/. It's not actually needed during early boot,
        and this deviates from upstream/Debian.
      * Adjust dbus.postinst to be systemd & usptart compatible when
        triggering reboot notification.
     -- Dimitri John Ledkov <email address hidden>   Tue, 03 Mar 2015 12:30:02 +0000
  • dbus (1.8.12-1ubuntu2) vivid; urgency=medium
    
      * Refresh the patches related to AppArmor D-Bus mediation to reflect what
        landed upstream in 1.9.12.
        - 0001-New-a-sv-helper-for-using-byte-arrays-as-the-variant.patch,
          0002-Add-LSM-agnostic-support-for-LinuxSecurityLabel-cred.patch,
          0003-Add-regression-test-for-LinuxSecurityLabel-credentia.patch,
          0004-Add-LinuxSecurityLabel-to-specification.patch: Add patches that
          report the AppArmor confinement context in the bus driver's
          GetConnectionCredentials method. A "LinuxSecurityLabel" key will be
          present in the dictionary returned by the GetConnectionCredentials
          method. The corresponding value will be the AppArmor confinement context
          of the connection.
        - 0001-Document-AppArmor-enforcement-in-the-dbus-daemon-man.patch,
          0002-Add-apparmor-element-and-attributes-to-the-bus-confi.patch,
          0003-Update-autoconf-file-to-build-against-libapparmor.patch,
          0004-Add-apparmor-element-support-to-bus-config-parsing.patch,
          0005-Initialize-AppArmor-mediation.patch,
          0006-Store-AppArmor-label-of-bus-during-initialization.patch,
          0007-Store-AppArmor-label-of-connecting-processes.patch,
          0008-Mediation-of-processes-that-acquire-well-known-names.patch,
          0009-Do-LSM-checks-after-determining-if-the-message-is-a-.patch,
          0010-Mediation-of-processes-sending-and-receiving-message.patch,
          0011-Mediation-of-processes-eavesdropping.patch: Replace the patches
          with the version that were merged upstream. The upstream review process
          revealed a number of bugs and useful cleanups that are addressed in the
          new patches.
          + No longer audit denials of unrequested reply messages (LP: #1362469)
        - aa-get-connection-apparmor-security-context.patch: Update patch to
          include a bug fix, from Simon McVittie, for AppArmor labels that contain
          non UTF-8 characters.
        - 0012-apparmor-tighten-up-terminology-for-context-vs.-labe.patch,
          0013-apparmor-Fix-build-failure-with-disable-apparmor.patch: New patches
          that were merged upstream to clean up the AA mediation code and fix a
          build failure
        - 0012-New-a-sv-helper-for-using-byte-arrays-as-the-variant.patch: Drop
          this patch. It became part of the "LinuxSecurityLabel" patch set and is
          added back with a new file name.
          0013-Add-AppArmor-support-to-GetConnectionCredentials.patch: Drop this
          patch in favor of the "LinuxSecurityLabel" patch set. This means that
          the AppArmorContext and AppArmorMode keys will not be present in the
          dictionary returned by GetConnectionCredentials. Ubuntu shipped this
          patch in 14.10 but, as far as I know, those keys were not used by any
          applications in 14.10. Since this patch was not accepted upstream,
          Ubuntu should drop it and new applications should begin using
          "LinuxSecurityLabel".
     -- Tyler Hicks <email address hidden>   Thu, 19 Feb 2015 11:06:14 -0600
  • dbus (1.8.12-1ubuntu1) vivid; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Install binaries into / rather than /usr:
          + debian/rules: Set --exec-prefix=/
          + debian/dbus.install, debian/dbus-x11.install: Install from /bin
        - Use upstart to start:
          + Add debian/dbus.upstart and dbus.user-session.upstart
          + debian/dbus.postinst: Use upstart call instead of invoking the init.d
            script for checking if we are already running.
          + debian/control: versioned dependency on netbase that emits the new
            deconfiguring-networking event used in upstart script.
        - 20_system_conf_limit.patch: Increase max_match_rules_per_connection for
          the system bus to 5000 (LP #454093)
        - 81-session.conf-timeout.patch: Raise the service startup timeout from 25
          to 60 seconds. It may be too short on the live CD with slow machines.
        - debian/dbus.user-session.upstart, debian/rules: Communicate session bus
          to Upstart Session Init to avoid potential out-of-memory scenario
          triggered by Upstart clients that do not run main loops. Store the
          session bus address in XDG_RUNTIME_DIR.
          (LP: #1235649, LP: #1252317).
        - debian/control, debian/rules: Build against libapparmor for AppArmor
          D-Bus mediation
        - debian/control: Use logind for session tracking, so that "at_console"
          policies work with logind instead of ConsoleKit. Add "libpam-systemd"
          recommends.
        - debian/rules: Adjust dbus-send path to our changed install layout.
          (LP: #1325364)
        - debian/dbus-Xsession: Don't start a session bus if there already is
          one, i. e. $DBUS_SESSION_BUS_ADDRESS is already set. (Closes: #681241)
        - 0001-Document-AppArmor-enforcement-in-the-dbus-daemon-man.patch,
          0002-Add-apparmor-element-and-attributes-to-the-bus-confi.patch,
          0003-Update-autoconf-file-to-build-against-libapparmor.patch,
          0004-Add-apparmor-element-support-to-bus-config-parsing.patch,
          0005-Initialize-AppArmor-mediation.patch,
          0006-Store-AppArmor-label-of-bus-during-initialization.patch,
          0007-Store-AppArmor-label-of-connecting-processes.patch,
          0008-Mediation-of-processes-that-acquire-well-known-names.patch,
          0009-Do-LSM-checks-after-determining-if-the-message-is-a-.patch,
          0010-Mediation-of-processes-sending-and-receiving-message.patch,
          0011-Mediation-of-processes-eavesdropping.patch,
          0012-New-a-sv-helper-for-using-byte-arrays-as-the-variant.patch,
          0013-Add-AppArmor-support-to-GetConnectionCredentials.patch: Add the
          latest set of AppArmor D-Bus mediation patches. This the v3 patch set
          from the upstream feature inclusion bug.
          - https://bugs.freedesktop.org/show_bug.cgi?id=75113
        - aa-get-connection-apparmor-security-context.patch: This is not
          intended for upstream inclusion. It implements a bus method
          (GetConnectionAppArmorSecurityContext) to get a connection's AppArmor
          security context but upstream D-Bus has recently added a generic way of
          getting a connection's security credentials (GetConnectionCredentials).
          Ubuntu should carry this patch until packages in the archive are moved
          over to the new, generic method of getting a connection's credentials.
    
    dbus (1.8.12-1) unstable; urgency=medium
    
      * New upstream release 1.8.12
        - increase auth_timeout from 5 seconds back to 30 seconds since it
          appears to cause slow or failed boot on some systems, reverting a
          change in 1.8.8 (Closes: #769069)
        - add a README.Debian to the dbus package documenting how
          sysadmins with hostile local users can get the lower timeout back,
          if their systems are fast enough to boot correctly like that
    
    dbus (1.8.10-1) unstable; urgency=medium
    
      * New upstream release 1.8.10
        - raise dbus-daemon's file descriptor limit to 65536 to avoid an
          opportunity for denial of service
          (CVE-2014-7824, an incomplete fix for CVE-2014-3636)
      * Start 'dbus-daemon --system' as root under sysvinit (it already
        starts as root under systemd), so it can increase its file
        descriptor limit
     -- Iain Lane <email address hidden>   Fri, 12 Dec 2014 18:04:56 +0000
  • dbus (1.8.8-2ubuntu2) vivid; urgency=medium
    
      * SECURITY UPDATE: denial of service via large number of fds
        - debian/patches/CVE-2014-7824.patch: raise rlimit and restore it for
          activated services in bus/activation.c, bus/bus.*,
          dbus/dbus-sysdeps-util-unix.c, dbus/dbus-sysdeps-util-win.c,
          dbus/dbus-sysdeps.h.
        - debian/dbus.init: don't launch daemon as a user so the rlimit can be
          raised.
        - CVE-2014-7824
      * SECURITY REGRESSION: authentication timeout on certain slower systems
        - debian/patches/CVE-2014-3639-regression.patch: raise auth_timeout
          back up to 30 secs in bus/config-parser.c, add a warning to
          bus/connection.c.
        - CVE-2014-3639
     -- Marc Deslauriers <email address hidden>   Tue, 25 Nov 2014 14:22:42 -0500
  • dbus (1.8.8-2ubuntu1) vivid; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Install binaries into / rather than /usr:
          + debian/rules: Set --exec-prefix=/
          + debian/dbus.install, debian/dbus-x11.install: Install from /bin
        - Use upstart to start:
          + Add debian/dbus.upstart and dbus.user-session.upstart
          + debian/dbus.postinst: Use upstart call instead of invoking the init.d
            script for checking if we are already running.
          + debian/control: versioned dependency on netbase that emits the new
            deconfiguring-networking event used in upstart script.
        - 20_system_conf_limit.patch: Increase max_match_rules_per_connection for
          the system bus to 5000 (LP #454093)
        - 81-session.conf-timeout.patch: Raise the service startup timeout from 25
          to 60 seconds. It may be too short on the live CD with slow machines.
        - debian/dbus.user-session.upstart, debian/rules: Communicate session bus
          to Upstart Session Init to avoid potential out-of-memory scenario
          triggered by Upstart clients that do not run main loops
          (LP: #1235649, LP: #1252317).
        - debian/control, debian/rules: Build against libapparmor for AppArmor
          D-Bus mediation
        - debian/control: Use logind for session tracking, so that "at_console"
          policies work with logind instead of ConsoleKit. Add "libpam-systemd"
          recommends.
        - debian/rules: Adjust dbus-send path to our changed install layout.
          (LP: #1325364)
        - debian/dbus-Xsession: Don't start a session bus if there already is
          one, i. e. $DBUS_SESSION_BUS_ADDRESS is already set. (Closes: #681241)
        - 0001-Document-AppArmor-enforcement-in-the-dbus-daemon-man.patch,
          0002-Add-apparmor-element-and-attributes-to-the-bus-confi.patch,
          0003-Update-autoconf-file-to-build-against-libapparmor.patch,
          0004-Add-apparmor-element-support-to-bus-config-parsing.patch,
          0005-Initialize-AppArmor-mediation.patch,
          0006-Store-AppArmor-label-of-bus-during-initialization.patch,
          0007-Store-AppArmor-label-of-connecting-processes.patch,
          0008-Mediation-of-processes-that-acquire-well-known-names.patch,
          0009-Do-LSM-checks-after-determining-if-the-message-is-a-.patch,
          0010-Mediation-of-processes-sending-and-receiving-message.patch,
          0011-Mediation-of-processes-eavesdropping.patch,
          0012-New-a-sv-helper-for-using-byte-arrays-as-the-variant.patch,
          0013-Add-AppArmor-support-to-GetConnectionCredentials.patch: Add the
          latest set of AppArmor D-Bus mediation patches. This the v3 patch set
          from the upstream feature inclusion bug.
          - https://bugs.freedesktop.org/show_bug.cgi?id=75113
        - aa-get-connection-apparmor-security-context.patch: This is not
          intended for upstream inclusion. It implements a bus method
          (GetConnectionAppArmorSecurityContext) to get a connection's AppArmor
          security context but upstream D-Bus has recently added a generic way of
          getting a connection's security credentials (GetConnectionCredentials).
          Ubuntu should carry this patch until packages in the archive are moved
          over to the new, generic method of getting a connection's credentials.
        - write to $XDG_RUNTIME_DIR instead of the users home when creating the
          dbus-session file, so we can start our session even with 100% filled or
          readonly home dir (LP: #1316978)
    
    dbus (1.8.8-2) unstable; urgency=medium
    
      [ Michael Biebl ]
      * Build against libsystemd-dev. In systemd v209 the various libraries were
        merged into a single libsystemd library.
    
      [ Simon McVittie ]
      * debian/dbus.bug-control: when people report bugs against dbus,
        also report the status of systemd and systemd-sysv (because
        those alter how system service activation works), and dbus-x11
        (because that's responsible for normal session bus setup)
      * Remove Build-Profiles control field until the syntax settles down
        (Closes: #764222)
      * Use --with-valgrind=auto (supported since 1.7.6) for the debug build
     -- Michael Vogt <email address hidden>   Mon, 27 Oct 2014 09:39:05 +0100
  • dbus (1.8.8-1ubuntu2) utopic; urgency=medium
    
      * write to $XDG_RUNTIME_DIR instead of the users home when creating the
        dbus-session file, so we can start our session even with 100% filled or
        readonly home dir (LP: #1316978)
     -- Oliver Grawert <email address hidden>   Fri, 26 Sep 2014 15:07:05 +0200