Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: dbus-1-devel | Distribution: openSUSE Tumbleweed |
Version: 1.14.10 | Vendor: openSUSE |
Release: 4.1 | Build date: Wed Oct 16 09:22:38 2024 |
Group: Unspecified | Build host: reproducible |
Size: 133050 | Source RPM: dbus-1-1.14.10-4.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://dbus.freedesktop.org/ | |
Summary: Developer package for D-Bus |
D-Bus is a message bus system, a simple way for applications to talk to one another. D-Bus supplies both a system daemon and a per-user-login-session daemon. Also, the message bus is built on top of a general one-to-one message passing framework, which can be used by any two apps to communicate directly (without going through the message bus daemon).
AFL-2.1 OR GPL-2.0-or-later
* Wed Oct 16 2024 Dominique Leuenberger <dimstar@opensuse.org> - Drop rcFOO symlinks (PED-266). * Mon Apr 29 2024 Simon Lees <sflees@suse.de> - Drop feature-suse-auto-socket-target-wants.patch and use the filesystem instead, this works more consistenly with dbus-broker * Mon Jan 08 2024 Callum Farmer <gmbr3@opensuse.org> - Add RH/Fedora compat provides dbus-libs to library package needed by Mullvad * Tue Dec 12 2023 Callum Farmer <gmbr3@opensuse.org> - Add feature-suse-auto-socket-target-wants.patch: move from static enable symlinks to systemd created symlinks otherwise it can't be enabled by systemd-presets-common-SUSE - Update feature-suse-refuse-manual-start-stop.patch: prevent killing the socket or user service aswell * Sat Dec 02 2023 Callum Farmer <gmbr3@opensuse.org> - common: dbus.socket still gets used after migration to dbus-broker so keep pre/post/postun scriptlets * Thu Sep 21 2023 Dominique Leuenberger <dimstar@opensuse.org> - Explicitly require /usr/bin/cmp for the post scripts instead of diffutils: allow other implementations like busybox-diffutils to be acceptable. * Thu Sep 21 2023 Simon Lees <sflees@suse.de> - No longer start or offer starting dbus as a system service dbus-broker will be the only supported system dbus. Although the existing daemon will stay as some things (gdm) require dbus-run-session * Wed Sep 13 2023 Dirk Müller <dmueller@suse.com> - update to 1.14.10: * Avoid a dbus-daemon crash if re-creating a connection's policy fails. If it isn't possible to re-create its policy (for example if it belongs to a user account that has been deleted or if the Name Service Switch is broken, on a system not supporting SO_PEERGROUPS), we now log a warning, continue to use its current policy, and continue to reload other connections' policies. * If getting the groups from a user ID fails, report the error correctly, instead of logging "(null)" * Return the primary group ID in GetConnectionCredentials()' UnixGroupIDs field for processes with a valid-but-empty supplementary group list * Mon Jun 12 2023 Dirk Müller <dmueller@suse.com> - update to 1.14.8 (bsc#1212126, CVE-2023-34969): * Denial-of-service fixes: * Fix an assertion failure in dbus-daemon when a privileged Monitoring connection (dbus-monitor, busctl monitor, gdbus monitor or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. This is a denial of service if triggered maliciously by a local attacker. * Fix compilation on compilers not supporting __FUNCTION__ * Fix some memory leaks on out-of-memory conditions * Fix syntax of a code sample in dbus-api-design * Thu Feb 23 2023 Callum Farmer <gmbr3@opensuse.org> - Move %tmpfiles_create to %post otherwise the file won't exist since it is now located in the correct package * Sun Feb 19 2023 Callum Farmer <gmbr3@opensuse.org> - Packaging changes: * Move missed scriptlets and links for dbus.socket to common * Move sysusers and tmpfiles scriptlets, and ghost files to common * Move dbus-launch man page to correct package * Fri Feb 10 2023 Dominique Leuenberger <dimstar@opensuse.org> - Fix multibuild: do not mention main flavor in multibuild, as it is implicit built. * Thu Feb 09 2023 Dirk Müller <dmueller@suse.com> - update to 1.14.6: * Fix an incorrect assertion that could be used to crash dbus-daemon or other users of DBusServer prior to authentication, if libdbus was compiled with assertions enabled. We recommend that production builds of dbus, for example in OS distributions, should be compiled with checks but without assertions. * When connected to a dbus-broker, stop dbus-monitor from incorrectly replying to Peer method calls that were sent to the dbus-broker with a NULL destination * Fix out-of-bounds varargs read in the dbus-daemon's config- parser. This is not attacker-triggerable and appears to be harmless in practice, but is technically undefined behaviour and is detected as such by AddressSanitizer. * Avoid a data race in multi-threaded use of DBusCounter * Fix a crash with some glibc versions when non-auditable SELinux events are logged (dbus!386, Jeremi Piotrowski) * If dbus_message_demarshal() runs out of memory while validating a message, report it as NoMemory rather than InvalidArgs (dbus#420, Simon McVittie) * Use C11 _Alignof if available, for better standards- compliance * Stop including an outdated copy of pkg.m4 in the git tree * Documentation: * Fix the test-apparmor-activation test after dbus#416 * Internal changes: * Fix CI builds with recent git versions (dbus#447, Simon McVittie) - switch to using multibuild * Wed Oct 26 2022 Dirk Müller <dmueller@suse.com> - update to 1.14.4 (bsc#1204111, CVE-2022-42010, bsc#1204112, CVE-2022-42011, bsc#1204113, CVE-2022-42012): This is a security update for the dbus 1.14.x stable branch, fixing denial-of-service issues (CVE-2022-42010, -42011, -42012) and applying security hardening (dbus#416). Behaviour changes: * On Linux, dbus-daemon and other uses of DBusServer now create a path-based Unix socket, unix:path=..., when asked to listen on a unix:tmpdir=... address. This makes unix:tmpdir=... equivalent to unix:dir=... on all platforms. Previous versions would have created an abstract socket, unix:abstract=..., in this situation. This change primarily affects the well-known session bus when run via dbus-launch(1) or dbus-run-session(1). The user bus, enabled by configuring dbus with --enable-user-session and running it on a systemd system, already used path-based Unix sockets and is unaffected by this change. This behaviour change prevents a sandbox escape via the session bus socket in sandboxing frameworks that can share the network namespace with the host system, such as Flatpak. This change might cause a regression in situations where the abstract socket is intentionally shared between the host system and a chroot or container, such as some use-cases of schroot(1). That regression can be resolved by using a bind-mount to share either the D-Bus socket, or the whole /tmp directory, with the chroot or container. (dbus#416, Simon McVittie) * Denial of service fixes: - Evgeny Vereshchagin discovered several ways in which an authenticated local attacker could cause a crash (denial of service) in dbus-daemon --system or a custom DBusServer. In uncommon configurations these could potentially be carried out by an authenticated remote attacker. - An invalid array of fixed-length elements where the length of the array is not a multiple of the length of the element would cause an assertion failure in debug builds or an out-of-bounds read in production builds. This was a regression in version 1.3.0. (dbus#413, CVE-2022-42011; Simon McVittie) - A syntactically invalid type signature with incorrectly nested parentheses and curly brackets would cause an assertion failure in debug builds. Similar messages could potentially result in a crash or incorrect message processing in a production build, although we are not aware of a practical example. (dbus#418, CVE-2022-42010; Simon McVittie) - A message in non-native endianness with out-of-band Unix file descriptors would cause a use-after-free and possible memory corruption in production builds, or an assertion failure in debug builds. This was a regression in version 1.3.0. (dbus#417, CVE-2022-42012; Simon McVittie) - Preserve errno on failure to open /proc/self/oom_score_adj (dbus!285, Gentoo#834725; Mike Gilbert) - On Linux, don't log warnings if oom_score_adj is read-only but does not need to be changed (dbus!291, Simon McVittie) - Slightly improve error-handling for inotify (dbus!235, Simon McVittie) - Don't crash if dbus-daemon is asked to watch more than 128 directories for changes (dbus!302, Jan Tojnar) * Thu Oct 13 2022 Dirk Müller <dmueller@suse.com> - Disable asserts (bsc#1087072) * Wed Jun 08 2022 Dirk Müller <dmueller@suse.com> - version provides - add split provides - remove unused/obsolete pre_checkin.sh * Thu May 26 2022 Simon Lees <sflees@suse.de> - The great dbus package split of 22, in preperation for replacing dbus-daemon with dbus-broker currently there is no functional difference that will change later, this follows a similar setup to RedHat and Debian. * dbus-daemon is now in its own separate package * Create a dbus-1-common package with all the files and config that are shared between the dbus-daemon and dbus-broker implementations. * Create a dbus-1-tools package with the tools eventually we will likely want to move to only recommending this package Redhat and Debian have both already gone down this path. * Thu Mar 17 2022 Fabian Vogt <fabian@ritter-vogt.de> - Drop use of %{with libalternatives}, there's no such bcond defined and in many other places it's not optional anyway (boo#1197258) * Mon Mar 14 2022 Dirk Müller <dmueller@suse.com> - set runstatedir correctly * Fri Mar 04 2022 Bjørn Lie <bjorn.lie@gmail.com> - Update to version 1.14.0: + Dependencies: - dbus now requires at least a basic level of support for C99 variadic macros, as implemented in gcc >= 3, all versions of Clang, and MSVC >= 2005. In practice this requirement has existed since version 1.9.2, but it is now official. - dbus now requires a C99-compatible va_copy() macro (or a __va_copy() macro with the same behaviour), except when building for Windows using MSVC and CMake. - On Unix platforms, if getpwnam_r() and getgrnam_r() are implemented, they must be POSIX-conformant. The non-POSIX signature seen in ancient Solaris versions will no longer work. - GLib >= 2.38 is required if full test coverage is enabled (reduced from 2.40 in dbus 1.12.x.) - Building using CMake now requires CMake 3.4. - Building documentation using CMake now requires xsltproc, Docbook DTDs (for example docbook-xml on Debian derivatives), and Docbook XSLT stylesheets (for example docbook-xsl on Debian derivatives). Using KDE's meinproc4 documentation processor is no longer supported. + Build-time configuration changes: Move CMake build system to top level, matching normal practice for CMake projects + Deprecations: - Third-party software should install default dbus policies for the system bus into ${datadir}/dbus-1/system.d (this has been supported since dbus 1.10, released in August 2015). Installing default dbus policies in ${sysconfdir}/dbus-1/system.d is now considered to be deprecated. Policy files in ${sysconfdir}/dbus-1/system.d continue to be read, but this directory should only be used by system administrators wishing to override the default policies. - The ${datadir} applicable to dbus is usually /usr/share and the ${sysconfdir} is usually /etc. - A similar pattern applies to the session bus policies in session.d. - The dbus-send(1) man page now documents --bus and --peer instead of the old --address synonym for --peer, which has been deprecated since the introduction of --bus and --peer in 1.7.6 - The dbus-daemon man page now has scarier warnings about <allow_anonymous/> and non-local TCP, which are insecure and should not be used, particularly for the standard system and session buses. - DBusServer (and hence the dbus-daemon) no longer accepts usernames (login names) for the recommended EXTERNAL authentication mechanism, only numeric user IDs or the empty string. See 1.13.0 release notes for full details. + New features: - On Linux 4.13 or later when built against a suitable glibc version, GetConnectionCredentials() now includes UnixGroupIDs, the effective group IDs of the initiator of the connection, taken from SO_PEERGROUPS. - On Linux 4.13 or later, <policy group="…"> now uses the SO_PEERGROUPS credentials-passing socket option to get the effective group IDs of the initiator of the connection. See 1.13.4 release notes for details. - Add a --sender option to dbus-send, which requests a name and holds it until the signal has been sent - dbus-daemon <allow> and <deny> rules can now specify a send_destination_prefix attribute, which is like a combination of send_destination and the arg0namespace keyword in match rules. See 1.13.12 release notes for more details. - The dbus-daemon now filters the messages that it relays, removing header fields that it does not understand. Clients must not rely on this behaviour unless they have confirmed that they are connected to a suitable message bus implementation, for example by querying its Features property. - The dbus-daemon now emits a signal, ActivatableServicesChanged, when the list of activatable services may have changed. Support for this signal can be discovered by querying the Features property. - It is now possible to disable traditional (non-systemd) service activation at build-time (Autotools: - -disable-traditional-activation, CMake: - DENABLE_TRADITIONAL_ACTIVATION=OFF). See 1.13.10 release notes for details. - The API reference manual can be built as a Qt compiled help file if qhelpgenerator(-qt5) is available. See 1.13.16 release notes for details. + Miscellaneous behaviour changes: - When using the "user bus" (--enable-user-session), put the dbus-daemon in the session slice - Several environment variables set by systemd are no longer passed on to activated services - If the dbus-daemon is compiled for Linux with systemd support, it now informs systemd that it is ready for use via the sd_notify() mechanism. - Tarball releases no longer contain pre-2007 changelogs and are now compressed with xz, making them around 35% smaller. - Drop conditionals for old obsolete versions of openSUSE. - Rebase patches with quilt. - Use https for source and sig URL. * Tue Mar 01 2022 Bjørn Lie <bjorn.lie@gmail.com> - Update to version 1.12.22: + On Linux, when using traditional (non-systemd) service activation, don't log warnings about failing to reset OOM score adjustment if the process is already more susceptible to the OOM killer, as user processes usually are with systemd ≥ 250. + On Linux, when using traditional (non-systemd) system bus activation, reset the OOM score adjustment to 0 as intended. If the system dbus-daemon is protected from the OOM killer, this avoids that protection unintentionally being inherited by every system service. + Avoid malloc() after fork on non-GNU libc. + Fix build with clang 13 by using Standard C offsetof where available. + Fix build of tests on FreeBSD. + Make documentation build more reproducible. + On Unix, make X11 autolaunch cope with slashes in DISPLAY. + Don't try to raise RLIMIT_NOFILE beyond OPEN_MAX on macOS. + Fix compilation if embedded tests are enabled but verbose mode and stats are both disabled. + On Linux, fix a race condition in the integration test for transient services. * Mon Nov 08 2021 Callum Farmer <gmbr3@opensuse.org> - Add CONFIG parameter to %sysusers_generate_pre * Thu Sep 23 2021 Stefan Schubert <schubi@suse.de> - Added BuildRequires alts for libalternatives. * Thu Sep 16 2021 Stefan Schubert <schubi@suse.de> - Fixed spec file regarding removing old update-alternatives entries. * Wed Aug 04 2021 Stefan Schubert <schubi@suse.de> - Use libalternatives instead of update-alternatives. * Wed Apr 07 2021 Dirk Müller <dmueller@suse.com> - avoid listing cmake directory - owned by cmake package
/usr/include/dbus-1.0 /usr/include/dbus-1.0/dbus /usr/include/dbus-1.0/dbus/dbus-address.h /usr/include/dbus-1.0/dbus/dbus-bus.h /usr/include/dbus-1.0/dbus/dbus-connection.h /usr/include/dbus-1.0/dbus/dbus-errors.h /usr/include/dbus-1.0/dbus/dbus-macros.h /usr/include/dbus-1.0/dbus/dbus-memory.h /usr/include/dbus-1.0/dbus/dbus-message.h /usr/include/dbus-1.0/dbus/dbus-misc.h /usr/include/dbus-1.0/dbus/dbus-pending-call.h /usr/include/dbus-1.0/dbus/dbus-protocol.h /usr/include/dbus-1.0/dbus/dbus-server.h /usr/include/dbus-1.0/dbus/dbus-shared.h /usr/include/dbus-1.0/dbus/dbus-signature.h /usr/include/dbus-1.0/dbus/dbus-syntax.h /usr/include/dbus-1.0/dbus/dbus-threads.h /usr/include/dbus-1.0/dbus/dbus-types.h /usr/include/dbus-1.0/dbus/dbus.h /usr/lib64/cmake/DBus1 /usr/lib64/cmake/DBus1/DBus1Config.cmake /usr/lib64/cmake/DBus1/DBus1ConfigVersion.cmake /usr/lib64/dbus-1.0 /usr/lib64/dbus-1.0/include /usr/lib64/dbus-1.0/include/dbus /usr/lib64/dbus-1.0/include/dbus/dbus-arch-deps.h /usr/lib64/libdbus-1.so /usr/lib64/pkgconfig/dbus-1.pc /usr/share/xml/dbus-1 /usr/share/xml/dbus-1/busconfig.dtd /usr/share/xml/dbus-1/catalog.xml /usr/share/xml/dbus-1/introspect.dtd
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Nov 13 00:41:02 2024