Change logs for gvfs source package in Eoan

  • gvfs (1.42.1-1ubuntu1) eoan; urgency=medium
    
      * Update to the current stable version by rebasing on Debian
        - Revert upstream changes to port to fuse 3. This is in universe in
          Ubuntu and we'll need to work out how to move over.
    
     -- Sebastien Bacher <email address hidden>  Tue, 08 Oct 2019 17:06:01 +0200
  • gvfs (1.42.0-1ubuntu1) eoan; urgency=medium
    
      * Revert upstream changes to port to fuse 3. This is in universe in Ubuntu
        and we'll need to work out how to move over.
    
     -- Sebastien Bacher <email address hidden>  Tue, 10 Sep 2019 21:03:10 +0200
  • gvfs (1.41.91-1ubuntu2) eoan; urgency=medium
    
      * No-change upload with strops.h and sys/strops.h removed in glibc.
    
     -- Matthias Klose <email address hidden>  Thu, 05 Sep 2019 13:38:45 +0200
  • gvfs (1.41.91-1ubuntu1) eoan; urgency=medium
    
      * Revert upstream changes to port to fuse 3. This is in universe in Ubuntu
        and we'll need to work out how to move over.
    
    gvfs (1.41.91-1) experimental; urgency=medium
    
      [ Simon McVittie ]
      * Add bug number and CVE ID to previous changelog entry
    
      [ Iain Lane ]
      * debian/watch: Find unstable versions
      * New upstream release
        + admin: Add query_info_on_read/write functionality (CVE-2019-12448)
        + admin: Allow changing file owner (CVE-2019-12447)
        + admin: Ensure correct ownership when moving to file:// uri
          (CVE-2019-12449)
        + admin: Prevent core dumps when daemon is manually started
        + admin: Use fsuid to ensure correct file ownership (CVE-2019-12447)
        + afc: Remove assumptions about length of device UUID to support new
          devices
        + afp: Fix afp backend crash when no username supplied
        + build: Add dependency on gsettings-desktop-schemas
        + build: Bump required meson version to 0.50.0
        + build: Define gvfs_rpath for libgvfsdaemon.so
        + build: Several meson improvements
        + daemon: Check that the connecting client is the same user
          (CVE-2019-12795)
        + daemon: Only accept EXTERNAL authentication (CVE-2019-12795)
        + daemon/udisks2: Handle lockdown option to disable writing
        + daemon: Unify some translatable strings
        + fuse: Adapt gvfsd-fuse to use fuse 3.x
        + fuse: Define RENAME_* macros when they are not defined
        + fuse: Remove max_write limit
        + gmountsource: Fix deadlocks in synchronous API
        + google: Check ownership in is_owner() without additional HTTP request
        + google: Disable deletion of non-empty directories
        + google: Do not enumerate volatile entries if title matches id
        + google: Fix crashes when deleting if the file isn't found
        + google: Fix issue with stale entries remaining after rename operation
        + google: Support deleting shared Google Drive files
        + proxy: Don't leak a GVfsDBusDaemon
        + udisks2: Change display name for crypto_unknown devices
      * debian/patches: Drop backported patches. We're further ahead now.
    
    gvfs (1.40.1-3) experimental; urgency=medium
    
      * Team upload
      * d/p/gvfsdaemon-Check-that-the-connecting-client-is-the-same-u.patch:
        Add missing authentication, preventing a local attacker from connecting
        to an abstract socket address learned from netstat(8) and issuing
        arbitrary D-Bus method calls
        (Closes: #930376, CVE-2019-12795)
      * d/p/gvfsdaemon-Only-accept-EXTERNAL-authentication.patch:
        Harden private D-Bus connection by rejecting the more complicated
        DBUS_COOKIE_SHA1 authentication mechanism and only accepting EXTERNAL
    
    gvfs (1.40.1-2) experimental; urgency=medium
    
      * Team upload
      * Update from upstream gnome-3-32 branch, commit 1.40.1-9-gec939a01,
        to fix the admin backend
        (Closes: #929755)
        - Implement query_info_on_read/write to fix some race conditions
          (CVE-2019-12448)
        - Ensure that created files get the correct ownership (CVE-2019-12247)
        - Ensure that copied files get the correct ownership (CVE-2019-12449)
        - Fix deadlocks in synchronous API
        - Various fixes for afc backend
        - Update translation: zh_CN
      * Remove obsolete version number from fuse dependency.
        gvfs needs fuse (>= 2.8.4), but that version is older than oldstable,
        so we can safely simplify to "Depends: fuse".
        The versioned dependency is not satisfied by fuse3's unversioned
        "Provides: fuse", but the unversioned dependency is. (Closes: #927221)
    
     -- Iain Lane <email address hidden>  Wed, 21 Aug 2019 12:33:35 +0100
  • gvfs (1.40.1-1ubuntu1) eoan; urgency=medium
    
      * SECURITY UPDATE: file ownership mishandling
        - debian/patches/CVE-2019-12447-1.patch: allow changing file owner in
          daemon/gvfsbackendadmin.c.
        - debian/patches/CVE-2019-12447-2.patch: use fsuid to ensure correct
          file ownership in daemon/gvfsbackendadmin.c.
        - CVE-2019-12447
      * SECURITY UPDATE: race conditions in admin backend
        - debian/patches/CVE-2019-12448.patch: add query_info_on_read/write
          functionality in daemon/gvfsbackendadmin.c.
        - CVE-2019-12448
      * SECURITY UPDATE: user and group ownership mishandling during move
        - debian/patches/CVE-2019-12449.patch: ensure correct ownership when
          moving to file:// uri in daemon/gvfsbackendadmin.c.
        - CVE-2019-12449
      * SECURITY UPDATE: incorrect D-Bus server socket restrictions
        - debian/patches/CVE-2019-12795-1.patch: check that the connecting
          client is the same user in daemon/gvfsdaemon.c.
        - debian/patches/CVE-2019-12795-2.patch: only accept EXTERNAL
          authentication in daemon/gvfsdaemon.c.
        - CVE-2019-12795
    
     -- Marc Deslauriers <email address hidden>  Fri, 05 Jul 2019 08:31:52 -0400
  • gvfs (1.40.1-1) experimental; urgency=medium
    
      * New upstream release
    
     -- Sebastien Bacher <email address hidden>  Tue, 09 Apr 2019 16:10:24 +0200