diff options
author | Simon McVittie <smcv@collabora.com> | 2022-10-02 11:43:30 +0100 |
---|---|---|
committer | Simon McVittie <smcv@collabora.com> | 2022-10-02 11:43:30 +0100 |
commit | 8246113fb14771f8faf1165aa4f9c4a1536e48b2 (patch) | |
tree | 12e89eb02ed0d5bf31dd320a8b1fbee17fe582ab /NEWS | |
parent | d1951de9b8fc90db7d3fb72764e13bc05304c1ec (diff) | |
download | dbus-8246113fb14771f8faf1165aa4f9c4a1536e48b2.tar.gz |
NEWS: Describe the behaviour change resulting from fixing dbus#416
Signed-off-by: Simon McVittie <smcv@collabora.com>
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 22 |
1 files changed, 21 insertions, 1 deletions
@@ -1,7 +1,27 @@ dbus 1.15.2 (UNRELEASED) ======================== -... +Behaviour changes: + +• On Linux, dbus-daemon and other uses of DBusServer now create a + path-based Unix socket, unix:path=..., when asked to listen on a + unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to + unix:dir=... on all platforms. + Previous versions would have created an abstract socket, unix:abstract=..., + in this situation. + This change primarily affects the well-known session bus when run via + dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring + dbus with --enable-user-session and running it on a systemd system, + already used path-based Unix sockets and is unaffected by this change. + This behaviour change prevents a sandbox escape via the session bus socket + in sandboxing frameworks that can share the network namespace with the host + system, such as Flatpak. + This change might cause a regression in situations where the abstract socket + is intentionally shared between the host system and a chroot or container, + such as some use-cases of schroot(1). That regression can be resolved by + using a bind-mount to share either the D-Bus socket, or the whole /tmp + directory, with the chroot or container. + (dbus#416, Simon McVittie) dbus 1.15.0 (2022-09-22) ======================== |