dbus-1-devel - Developer package for D-Bus

Distribution: openSUSE 13.2
Repository: openSUSE Update all
Package name: dbus-1-devel
Package version: 1.8.14
Package release: 12.1
Package architecture: i586
Package type: rpm
Installed size: 114.61 KB
Download size: 71.67 KB
Official Mirror: ftp.gwdg.de
D-Bus is a message bus system, a simple way for applications to talk to one another. D-Bus supplies both a system daemon and a per-user-login-session daemon. Also, the message bus is built on top of a general one-to-one message passing framework, which can be used by any two apps to communicate directly (without going through the message bus daemon).



  • dbus-1-devel = 1.8.14-12.1
  • dbus-1-devel(x86-32) = 1.8.14-12.1
  • pkgconfig(dbus-1) = 1.8.14


    Install Howto

    Install dbus-1-devel rpm package:

    # zypper install dbus-1-devel


    • /usr/include/dbus-1.0/
    • /usr/include/dbus-1.0/dbus/dbus-address.h
    • /usr/include/dbus-1.0/dbus/dbus-bus.h
    • /usr/include/dbus-1.0/dbus/dbus-connection.h
    • /usr/include/dbus-1.0/dbus/dbus-errors.h
    • /usr/include/dbus-1.0/dbus/dbus-macros.h
    • /usr/include/dbus-1.0/dbus/dbus-memory.h
    • /usr/include/dbus-1.0/dbus/dbus-message.h
    • /usr/include/dbus-1.0/dbus/dbus-misc.h
    • /usr/include/dbus-1.0/dbus/dbus-pending-call.h
    • /usr/include/dbus-1.0/dbus/dbus-protocol.h
    • /usr/include/dbus-1.0/dbus/dbus-server.h
    • /usr/include/dbus-1.0/dbus/dbus-shared.h
    • /usr/include/dbus-1.0/dbus/dbus-signature.h
    • /usr/include/dbus-1.0/dbus/dbus-syntax.h
    • /usr/include/dbus-1.0/dbus/dbus-threads.h
    • /usr/include/dbus-1.0/dbus/dbus-types.h
    • /usr/include/dbus-1.0/dbus/dbus.h
    • /usr/lib/libdbus-1.so
    • /usr/lib/dbus-1.0/
    • /usr/lib/dbus-1.0/include/
    • /usr/lib/dbus-1.0/include/dbus/dbus-arch-deps.h
    • /usr/lib/pkgconfig/dbus-1.pc


    2015-01-06 - fstrba@suse.com - Update to 1.8.14 * Security hardening: - Do not allow calls to UpdateActivationEnvironment from uids other than the uid of the dbus-daemon. If a system service installs unsafe security policy rules that allow arbitrary method calls (such as CVE-2014-8148) then this prevents memory consumption and possible privilege escalation via UpdateActivationEnvironment. We believe that in practice, privilege escalation here is avoided by dbus-daemon-launch-helper sanitizing its environment; but it seems better to be safe. - Do not allow calls to UpdateActivationEnvironment or the Stats interface on object paths other than /org/freedesktop/DBus. Some system services install unsafe security policy rules that allow arbitrary method calls to any destination, method and interface with a specified object path; while less bad than allowing arbitrary method calls, these security policies are still harmful, since dbus-daemon normally offers the same API on all object paths and other system services might behave similarly. * Other fixes: - Add missing initialization so GetExtendedTcpTable doesn't crash on Windows Vista SP0 (fdo#77008, Ilya A. Tkachenko)

    2014-11-25 - fstrba@suse.com - Update to 1.8.12: * Fixes: - Partially revert the CVE-2014-3639 patch by increasing the default authentication timeout on the system bus from 5 seconds back to 30 seconds, since this has been reported to cause boot regressions for some users, mostly with parallel boot (systemd) on slower hardware. On fast systems where local users are considered particularly hostile, administrators can return to the 5 second timeout (or any other value in milliseconds) by saving this as /etc/dbus-1/system-local.conf: <busconfig> <limit name="auth_timeout">5000</limit> </busconfig> (fdo#86431, Simon McVittie) - Add a message in syslog/the Journal when the auth_timeout is exceeded (fdo#86431, Simon McVittie) - Send back an AccessDenied error if the addressed recipient is not allowed to receive a message (and in builds with assertions enabled, don't assert under the same conditions). (fdo#86194, Jacek Bukarewicz)

    2014-11-10 - fstrba@suse.com - Update to 1.8.10: * Security fixes: - Increase dbus-daemon's RLIMIT_NOFILE rlimit to 65536 so that CVE-2014-3636 part A cannot exhaust the system bus' file descriptors, completing the incomplete fix in 1.8.8. (CVE-2014-7824, fd.o #85105; Simon McVittie, Alban Crequy)

    2014-09-30 - fstrba@suse.com - Reformat the spec file using spec-cleaner

    2014-09-18 - fstrba@suse.com - Update baselibs.conf: Provides dbus-1-32bit in lib package