Fedora Linux 8811 Published by

An usbview security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: usbview-3.0-1.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-256142639c
2022-02-01 01:05:50.764911
--------------------------------------------------------------------------------

Name : usbview
Product : Fedora 34
Version : 3.0
Release : 1.fc34
URL : http://www.kroah.com/linux-usb/
Summary : USB topology and device viewer
Description :
Display information about the topology of the devices connected to the USB bus
on a Linux machine. It also displays detailed information on the individual
devices.

--------------------------------------------------------------------------------
Update Information:

* Update to 3.0 (fixes (CVE-2022-23220) * Move to upstream desktop/polkit policy
* Use %%license * Cleanup spec * Stop using debugfs unnecessarily
--------------------------------------------------------------------------------
ChangeLog:

* Sat Jan 22 2022 FeRD (Frank Dana> - 3.0-1
- New upstream release
* Sat Jan 22 2022 Peter Robinson - 2.2-1
- Update to 2.2 (fixes (CVE-2022-23220)
- Move to upstream desktop/polkit policy
- Use %license
- Cleanup spec
* Sat Jan 22 2022 Fedora Release Engineering - 2.0-20
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Fri Jul 23 2021 Fedora Release Engineering - 2.0-19
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-256142639c' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________