D-Bus Message Bus System

Edit Package dbus-1

D-Bus is a message bus system, a simple way for applications to talk to
one another. D-Bus supplies both a system daemon and a
per-user-login-session daemon. Also, the message bus is built on top of
a general one-to-one message passing framework, which can be used by
any two apps to communicate directly (without going through the message
bus daemon).

Refresh
Refresh
Source Files
Filename Size Changed
baselibs.conf 0000000173 173 Bytes
dbus-1-devel-doc.changes 0000137803 135 KB
dbus-1-devel-doc.spec 0000004899 4.78 KB
dbus-1-x11.changes 0000137803 135 KB
dbus-1-x11.spec 0000003813 3.72 KB
dbus-1.12.20.tar.gz 0002095511 2 MB
dbus-1.12.20.tar.gz.asc 0000000833 833 Bytes
dbus-1.changes 0000137803 135 KB
dbus-1.desktop 0000000131 131 Bytes
dbus-1.keyring 0000009549 9.33 KB
dbus-1.spec 0000010036 9.8 KB
feature-suse-do-autolaunch.patch 0000000928 928 Bytes
feature-suse-log-deny.patch 0000000396 396 Bytes
feature-suse-refuse-manual-start-stop.patch 0000000479 479 Bytes
messagebus.conf 0000000070 70 Bytes
pre_checkin.sh 0000000129 129 Bytes
Revision 162 (latest revision is 180)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 826904 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 162)
- Update to 1.12.20
  * On Unix, avoid a use-after-free if two usernames have the same
    numeric uid. In older versions this could lead to a crash (denial of
    service) or other undefined behaviour, possibly including incorrect
    authorization decisions if <policy group=...> is used.
    Like Unix filesystems, D-Bus' model of identity cannot distinguish
    between users of different names with the same numeric uid, so this
    configuration is not advisable on systems where D-Bus will be used.
    Thanks to Daniel Onaca.
    (dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
  * CVE-2020-12049: If a message contains more file descriptors than can
    be sent, close those that did get through before reporting error.
    Previously, a local attacker could cause the system dbus-daemon (or
    another system service with its own DBusServer) to run out of file
    descriptors, by repeatedly connecting to the server and sending fds that
    would get leaked.
    Thanks to Kevin Backhouse of GitHub Security Lab.
    (dbus#294, GHSL-2020-057; Simon McVittie)
  * Fix a crash when the dbus-daemon is terminated while one or more
    monitors are active (dbus#291, dbus!140; Simon McVittie)
  * The dbus-send(1) man page now documents --bus and --peer instead of
    the old --address synonym for --peer, which has been deprecated since
	the introduction of --bus and --peer in 1.7.6
	(fd.o #48816, dbus!115; Chris Morin)
  * Fix a wrong environment variable name in dbus-daemon(1)
    (dbus#275, dbus!122; Mubin, Philip Withnall)
  * Fix formatting of dbus_message_append_args example
	(dbus!126, Felipe Franciosi)
  * Avoid a test failure on Linux when built in a container as uid 0, but
Comments 0
openSUSE Build Service is sponsored by