~enr0n/ubuntu/+source/systemd:ubuntu-focal-sru

Last commit made on 2023-03-15
Get this branch:
git clone -b ubuntu-focal-sru https://git.launchpad.net/~enr0n/ubuntu/+source/systemd
Only Nick Rosbrook can upload to this branch. If you are Nick Rosbrook please log in for upload directions.

Branch merges

Branch information

Name:
ubuntu-focal-sru
Repository:
lp:~enr0n/ubuntu/+source/systemd

Recent commits

c01b87a... by Nick Rosbrook

Release systemd 245.4-4ubuntu3.21

0ce313c... by Nick Rosbrook

Update changelog

264bdc8... by Nick Rosbrook

debian/test: ignore systemd-remount-fs.service failure in containers (LP: #1991285)

The failure is caused by an entry in /etc/fstab for a disk label
(cloudimg-rootfts) that does not exist on the system. The /etc/fstab is
specific to the lxd images used in autopkgtest, so just ignore this
failure when running in containers.

Gbp-Dch: Short

adaddd1... by Nick Rosbrook

test-seccomp: accept ENOSYS from sysctl(2) too (LP: #1933090)

upstream and root-unitttest suites are failing on focal-5.15 backports
on test_protect_syscall:
Assertion 'errno == EFAULT' failed at src/test/test-seccomp.c:311

This is due to sysctl being removed completely from 5.5 onwards
(88db0aa2421666d2f73486d15b239a4521983d55)
The assertion now check if either EFAULT or ENOSYS is returned instead.

Thanks: Roxana Nicolescu
Gbp-Dch: Short

69ab4a0... by Nick Rosbrook

udev: avoid NIC renaming race with kernel (LP: #2002445)

This consists of the following upstream commits:

 * udev: attempt device rename even if interface is up
 * sd-netlink: restore altname on error in rtnl_set_link_name
 * sd-netlink: do not swap old name and alternative name
 * netlink: do not fail when new interface name is already used as an
 * netlink: introduce rtnl_get/delete_link_alternative_names()
 * udev/net: allow new link name as an altname before renaming happens

Gbp-Dch: Short

28d9872... by Nishit Majithia

Import Debian changes 245.4-4ubuntu3.20

systemd (245.4-4ubuntu3.20) focal-security; urgency=medium
.
  * SECURITY UPDATE: buffer overrun vulnerability in format_timespan()
    - debian/patches/CVE-2022-3821.patch: time-util: fix buffer-over-run
    - CVE-2022-3821
  * SECURITY UPDATE: information leak vulnerability in systemd-coredump
    - debian/patches/CVE-2022-4415.patch: do not allow user to access
      coredumps with changed uid/gid/capabilities
    - CVE-2022-4415

e773b52... by Nick Rosbrook

Revert "Release systemd 245.4-4ubuntu3.20"

This reverts the following commits:

 e34409f9d68a15220aa36cbae219d4f4987e5207
 706f2e0c787cade9609d0f2b37634d7eb4517beb
 cddc66ef6ecfb555dfd38c5f5fe8572efb424114
 740fb8589ba15388dee1055efba4cb2638711ff1
 686564df37e347d9e381d246404bc80f37618523

A security update was released before this upload was accepted, so these
changes will be released in 245.4-4ubuntu3.21 instead. These changes
need to be reverted so that the security update can be imported
correctly.

Gbp-Dch: Ignore

686564d... by Nick Rosbrook

Release systemd 245.4-4ubuntu3.20

740fb85... by Nick Rosbrook

Update changelog

cddc66e... by Nick Rosbrook

debian/test: ignore systemd-remount-fs.service failure on armhf (LP: #1991285)

This appears to have started happening after kernel updates. Since there
have not been any reports of this causing issues in real deployments,
just ignore the failure in autopkgtest.

Gbp-Dch: Short