[ubuntu/jammy-proposed] gnome-keyring 40.0-3ubuntu1 (Accepted)

Rico Tzschichholz ricotz at ubuntu.com
Wed Oct 27 14:05:12 UTC 2021


gnome-keyring (40.0-3ubuntu1) jammy; urgency=medium

  * Sync with Debian. Remaining changes:
    - debian/user/*, debian/gnome-keyring.links, debian/gnome-keyring.install:
      + Install units to start gnome-keyring with systemd if the session
        is using it

gnome-keyring (40.0-3) unstable; urgency=medium

  * Team upload
  * Don't add CAP_IPC_LOCK capability to gnome-keyring-daemon.
    GNOME Keyring uses "memory locking" to prevent memory buffers from being
    written out to swap, in an attempt to prevent passwords and other secrets
    from being written to disk unencrypted. Since Linux 2.6.9 (Debian 4.0,
    2007) it has been possible to lock memory up to the limit defined by
    RLIMIT_MEMLOCK without requiring the CAP_IPC_LOCK capability.
    Since GLib 2.70, security hardening in GLib means that this capability
    interferes with the ability to connect to the D-Bus session bus, which
    is required functionality for gnome-keyring.
    RLIMIT_MEMLOCK defaults to 64 KiB, although it is considerably higher on
    typical Debian systems due to #976373. If memory locking for larger
    quantities of secret data is required, please configure a higher
    RLIMIT_MEMLOCK in /etc/security/limits.conf.
    Using encrypted swap, with an ephemeral key if suspend-to-disk is not
    required, is recommended as a more robust way to prevent passwords
    from reaching disk. Full-disk encryption is also recommended for
    systems where confidentiality is important.
    (Closes: #994961)
  * Don't build with capabilities support on Linux architectures.
    Now that we are not setting CAP_IPC_LOCK, this is not useful, and
    disabling it silences some misleading warnings. gnome-keyring will still
    log a warning if it cannot allocate enough locked memory for its needs.
  * Add proposed patches to avoid unnecessary use of unlocked memory.
    Older versions of gnome-keyring did not always prevent larger items of
    secret data from being swapped out, even if they could, due to a logic
    error when allocating new blocks of locked memory.

gnome-keyring (40.0-2) unstable; urgency=medium

  * Build-Depend on debhelper-compat 13
  * Build-Depend on dh-sequence-gnome instead of gnome-pkg-tools
  * debian/rules: clean up unneeded rules
  * Release to unstable

Date: Wed, 27 Oct 2021 08:45:29 +0200
Changed-By: Rico Tzschichholz <ricotz at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Sebastien Bacher <seb128 at ubuntu.com>
https://launchpad.net/ubuntu/+source/gnome-keyring/40.0-3ubuntu1
-------------- next part --------------
Format: 1.8
Date: Wed, 27 Oct 2021 08:45:29 +0200
Source: gnome-keyring
Built-For-Profiles: noudeb
Architecture: source
Version: 40.0-3ubuntu1
Distribution: jammy
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Rico Tzschichholz <ricotz at ubuntu.com>
Closes: 994961
Changes:
 gnome-keyring (40.0-3ubuntu1) jammy; urgency=medium
 .
   * Sync with Debian. Remaining changes:
     - debian/user/*, debian/gnome-keyring.links, debian/gnome-keyring.install:
       + Install units to start gnome-keyring with systemd if the session
         is using it
 .
 gnome-keyring (40.0-3) unstable; urgency=medium
 .
   * Team upload
   * Don't add CAP_IPC_LOCK capability to gnome-keyring-daemon.
     GNOME Keyring uses "memory locking" to prevent memory buffers from being
     written out to swap, in an attempt to prevent passwords and other secrets
     from being written to disk unencrypted. Since Linux 2.6.9 (Debian 4.0,
     2007) it has been possible to lock memory up to the limit defined by
     RLIMIT_MEMLOCK without requiring the CAP_IPC_LOCK capability.
     Since GLib 2.70, security hardening in GLib means that this capability
     interferes with the ability to connect to the D-Bus session bus, which
     is required functionality for gnome-keyring.
     RLIMIT_MEMLOCK defaults to 64 KiB, although it is considerably higher on
     typical Debian systems due to #976373. If memory locking for larger
     quantities of secret data is required, please configure a higher
     RLIMIT_MEMLOCK in /etc/security/limits.conf.
     Using encrypted swap, with an ephemeral key if suspend-to-disk is not
     required, is recommended as a more robust way to prevent passwords
     from reaching disk. Full-disk encryption is also recommended for
     systems where confidentiality is important.
     (Closes: #994961)
   * Don't build with capabilities support on Linux architectures.
     Now that we are not setting CAP_IPC_LOCK, this is not useful, and
     disabling it silences some misleading warnings. gnome-keyring will still
     log a warning if it cannot allocate enough locked memory for its needs.
   * Add proposed patches to avoid unnecessary use of unlocked memory.
     Older versions of gnome-keyring did not always prevent larger items of
     secret data from being swapped out, even if they could, due to a logic
     error when allocating new blocks of locked memory.
 .
 gnome-keyring (40.0-2) unstable; urgency=medium
 .
   * Build-Depend on debhelper-compat 13
   * Build-Depend on dh-sequence-gnome instead of gnome-pkg-tools
   * debian/rules: clean up unneeded rules
   * Release to unstable
Checksums-Sha1:
 3564de5b97c7f66f0ea151438c29a336546ec881 2172 gnome-keyring_40.0-3ubuntu1.dsc
 0e5287f5e0c8a0dcce960824bd4e43b223ada2a7 1333440 gnome-keyring_40.0.orig.tar.xz
 0e9e86a029426f090aed9b2b1b0d2e80f0056297 21996 gnome-keyring_40.0-3ubuntu1.debian.tar.xz
 79285d461ef3b7f566d481a4ce73c79ed8ea3621 17590 gnome-keyring_40.0-3ubuntu1_source.buildinfo
Checksums-Sha256:
 afdd3f140b61858e1d4fce8161bab0694b458b8fb82483dc9e14fd23bafbafd8 2172 gnome-keyring_40.0-3ubuntu1.dsc
 a3d24db08ee2fdf240fbbf0971a98c8ee295aa0e1a774537f4ea938038a3b931 1333440 gnome-keyring_40.0.orig.tar.xz
 615a86ae99e473c13a20ac7dbd9743688c63a6d97bbb4f524be42c06446c592b 21996 gnome-keyring_40.0-3ubuntu1.debian.tar.xz
 2582ad1296b79ddf93ab6815a18d65554ab7ff54d0231eff116e62d2cea95576 17590 gnome-keyring_40.0-3ubuntu1_source.buildinfo
Files:
 06be2d2e932e725c89a245509bac7835 2172 gnome optional gnome-keyring_40.0-3ubuntu1.dsc
 f404b61683a0ff54fb264b337772cff2 1333440 gnome optional gnome-keyring_40.0.orig.tar.xz
 0e94b91f168f56a4bbb24dc19b937968 21996 gnome optional gnome-keyring_40.0-3ubuntu1.debian.tar.xz
 060b1b93a77b87fc98ec6b4949a21ea3 17590 gnome optional gnome-keyring_40.0-3ubuntu1_source.buildinfo
Original-Maintainer: Debian GNOME Maintainers <pkg-gnome-maintainers at lists.alioth.debian.org>


More information about the jammy-changes mailing list