~usarinheininga/ubuntuplasma/+git/systemd:eos4.0

Last commit made on 2022-10-06
Get this branch:
git clone -b eos4.0 https://git.launchpad.net/~usarinheininga/ubuntuplasma/+git/systemd

Branch merges

Branch information

Recent commits

d1c4694... by =?utf-8?q?Jo=C3=A3o_Paulo_Rechi_Vita?= <email address hidden>

Revert "[DEB] Bring tmpfiles.d/tmp.conf in line with Debian defaults"

This reverts commit 97461254ad826ac7a36f6ea7e181c8e65cc6a98f.

Debian's policy is to never clean-up /var/tmp to keep consistency with
the SysV init system. Flatpak creates temporary files in /var/tmp during
app updates but does not remove them on error, to avoid re-downloading
them on a future update attempt, and expects these files to be
automatically cleaned-up by the system eventually, according to the
site's policy. With this policy in place these files are never removed,
wasting the user's storage space.

Revert this commit back to upstream's default policy of cleaning up /tmp
every 10 days and /var/tmp every 30 days.

https://phabricator.endlessm.com/T23762
https://phabricator.endlessm.com/T33887

386ebfc... by Dan Nicholson

Merge pull request #138 from endlessm/T30232

Revert "[Endless] rules: Remove references to the "kvm" group"

270f6e0... by =?utf-8?q?Jo=C3=A3o_Paulo_Rechi_Vita?= <email address hidden>

Revert "[Endless] rules: Remove references to the "kvm" group"

This reverts commit d156b8640c7034483d3588f02359b89f2ad64f59.

We are going to create the kvm group, so we can drop this commit.

https://phabricator.endlessm.com/T30232

d37ae39... by Dan Nicholson

Merge pull request #135 from endlessm/T32674

Backport latest systemd fixes from Debian Bullseye

b02c405... by Zbigniew Jędrzejewski-Szmek

[DEB] basic/unit-name: adjust comments

We already checked for "too long" right above…

226016d... by Zbigniew Jędrzejewski-Szmek

[DEB] basic/unit-name: do not use strdupa() on a path

The path may have unbounded length, for example through a fuse mount.

CVE-2021-33910: attacked controlled alloca() leads to crash in systemd and
ultimately a kernel panic. Systemd parses the content of /proc/self/mountinfo
and each mountpoint is passed to mount_setup_unit(), which calls
unit_name_path_escape() underneath. A local attacker who is able to mount a
filesystem with a very long path can crash systemd and the whole system.

https://bugzilla.redhat.com/show_bug.cgi?id=1970887

The resulting string length is bounded by UNIT_NAME_MAX, which is 256. But we
can't easily check the length after simplification before doing the
simplification, which in turns uses a copy of the string we can write to.
So we can't reject paths that are too long before doing the duplication.
Hence the most obvious solution is to switch back to strdup(), as before
7410616cd9dbbec97cf98d75324da5cda2b2f7a2.

c1fdb8d... by Lennart Poettering <email address hidden>

[DEB] unit-name: generate a clear error code when converting an overly long fs path to a unit name

[Salvatore Bonaccorso: Backport to 247.3 for context changes in
src/test/test-unit-name.c]

33e9cf9... by Dan Nicholson

Merge pull request #134 from endlessm/T32428

Backport periodically time saving by systemd-timesyncd

0016dbd... by Dimitry Ishenko

timesync: add option to periodically save time

202da76... by Zbigniew Jędrzejewski-Szmek

timesync: rename variable to match config name

PollIntervalMinSec and PollIntervalMaxSec use the same pattern, but
RootDistanceMaxSec had switched orderd in the code.