Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8812: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
  • CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
  • CVE-2022-42012: dbus: _dbus_marshal_byteswap doesn’t process fds in messages with “foreign” endianness correctly
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Moderate: dbus security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for dbus is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

  • dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
  • dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
  • dbus: `_dbus_marshal_byteswap` doesn’t process fds in messages with “foreign” endianness correctly (CVE-2022-42012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2133616 - CVE-2022-42010 dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
  • BZ - 2133617 - CVE-2022-42011 dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
  • BZ - 2133618 - CVE-2022-42012 dbus: `_dbus_marshal_byteswap` doesn’t process fds in messages with “foreign” endianness correctly

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

x86_64

dbus-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: acf1894dc5707ab8f656d64ef386857469ad311503fba8dbb8ebf224cb07aaf1

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 74d5ac38eb712179626f872c3b976c2c7ce8be2d16746e99bfabe5cbe0237980

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-devel-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 64147c76a110bf2696ab6aa123407104533cd898d6681bcdf0ea734eb830adb6

dbus-devel-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e45e8bd8e9d3f50088eeed0ec4e1acb831e35c004598b411570c6d2176b19f45

dbus-libs-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 07512ec6cfb84826cd6c3595db42130c3397ba786be11831e232628730c0e171

dbus-libs-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 14a05d25d06efa65ef246182d494daffa83993a849089e2eb37aa24572f06281

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tools-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e8f032cc836aa435ea20f153d9038b6d957102e20af54572dde6dcd70ba3f0a2

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-x11-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 1d40129106bfb5ab222cd66075b5baccb13600cee77935eec146f6ade8a6f706

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

x86_64

dbus-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: acf1894dc5707ab8f656d64ef386857469ad311503fba8dbb8ebf224cb07aaf1

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 74d5ac38eb712179626f872c3b976c2c7ce8be2d16746e99bfabe5cbe0237980

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-devel-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 64147c76a110bf2696ab6aa123407104533cd898d6681bcdf0ea734eb830adb6

dbus-devel-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e45e8bd8e9d3f50088eeed0ec4e1acb831e35c004598b411570c6d2176b19f45

dbus-libs-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 07512ec6cfb84826cd6c3595db42130c3397ba786be11831e232628730c0e171

dbus-libs-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 14a05d25d06efa65ef246182d494daffa83993a849089e2eb37aa24572f06281

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tools-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e8f032cc836aa435ea20f153d9038b6d957102e20af54572dde6dcd70ba3f0a2

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-x11-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 1d40129106bfb5ab222cd66075b5baccb13600cee77935eec146f6ade8a6f706

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

s390x

dbus-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 37dce4bc780fd7598ba73f04afa838147565166d5196962ba1734e7b2ab17648

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 0635ad2b59c2f47c0935d039a1d9b6758da282c54e5d52ddd3acf336a4525ac8

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: bf8448f771f5be027dceb52cd65f5f70998d1cfa8c54d3d9b57f8f56f7439f1e

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: bf8448f771f5be027dceb52cd65f5f70998d1cfa8c54d3d9b57f8f56f7439f1e

dbus-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 8556dbea793f4dd82de0c75d92d04ca5eb75a998d0b9a038dce8e49b41dd904b

dbus-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 8556dbea793f4dd82de0c75d92d04ca5eb75a998d0b9a038dce8e49b41dd904b

dbus-debugsource-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 45981cc41fecbd74e201f061ca2d803d1b78ebe65a92e8de4a3ecd80cd5a7bf0

dbus-debugsource-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 45981cc41fecbd74e201f061ca2d803d1b78ebe65a92e8de4a3ecd80cd5a7bf0

dbus-devel-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 19f70748fab94e421b4b3334b6354a1a6c06f81e25b6bf73f9d59b1fb1cbe135

dbus-libs-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 7a83fc03643b352a1feb4bccb0e564ef76ed07851bc1afa1a3effd2a548be072

dbus-libs-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 368257220b4f6a3e28c0760495b16577020ee05fc1e48a3936af964253c65cd2

dbus-libs-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 368257220b4f6a3e28c0760495b16577020ee05fc1e48a3936af964253c65cd2

dbus-tests-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: c6b8870f8d8ac9b696a4b64ea8257a9e089fb809df98bb16684740748804ebb7

dbus-tests-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: c6b8870f8d8ac9b696a4b64ea8257a9e089fb809df98bb16684740748804ebb7

dbus-tools-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 915b3949d74f9e33cc2b8d78df6ca450d21f58f6f0322c2341184779cfae66bc

dbus-tools-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: c5370a977577c44135515788732a692960b26890b2fde797dcb67df97f07b15e

dbus-tools-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: c5370a977577c44135515788732a692960b26890b2fde797dcb67df97f07b15e

dbus-x11-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 4ef36246895adc0e3a71cc94b3bd75e77e0b632d8c813faa21fc243cdfd698dc

dbus-x11-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 509ba21b6af42c287c53f3ddca892006a88d4fd69c977300b3e8439c4d626218

dbus-x11-debuginfo-1.12.8-18.el8_6.2.s390x.rpm

SHA-256: 509ba21b6af42c287c53f3ddca892006a88d4fd69c977300b3e8439c4d626218

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

ppc64le

dbus-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: b73a77eda9958bf22977d0ebd30d08e9f0d8a9092de28400e7d774846f9e4e91

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 6b1c7dedffedc7136218179ca574aa567a65e2744096996639738ef54a3873c4

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 57958fa5deb95d07f1e0741f13df9eb7640dabf9e4ee1a12a403a80457655419

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 57958fa5deb95d07f1e0741f13df9eb7640dabf9e4ee1a12a403a80457655419

dbus-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 7c7bac46a2c4e45da241c1029a62448b08120d58e5a69f6ec5164a2dc9eef414

dbus-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 7c7bac46a2c4e45da241c1029a62448b08120d58e5a69f6ec5164a2dc9eef414

dbus-debugsource-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 54bbe49e90359fc654bf265ef1bc9f0e208ede4059ead74a3cd842faf9fc76e0

dbus-debugsource-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 54bbe49e90359fc654bf265ef1bc9f0e208ede4059ead74a3cd842faf9fc76e0

dbus-devel-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 67e3dd4296f4a0c6ba7a9113558afe91fbfa9be11059c11fd6dda6edbc0cae24

dbus-libs-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: c7177b3839c5a5f515917cd7e68f900f89385cde5d13b8f1ccc7944939e0ffc5

dbus-libs-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 45b40bf7b514d08be428729b5b9242a6906b17f50f4f0560528846391747819f

dbus-libs-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 45b40bf7b514d08be428729b5b9242a6906b17f50f4f0560528846391747819f

dbus-tests-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: e8b148e30e6ae84f4878e14ae8977819e2061f2f3416497820341b76dd357d74

dbus-tests-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: e8b148e30e6ae84f4878e14ae8977819e2061f2f3416497820341b76dd357d74

dbus-tools-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 327d3be73342bf32c9bd6ce17b27933e323afbfca0ca81a74d7617df1f2bd1a6

dbus-tools-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: f44b81f48d233d448de6be8ef4544935d4c4ec2807e5f3533040f657a0abd813

dbus-tools-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: f44b81f48d233d448de6be8ef4544935d4c4ec2807e5f3533040f657a0abd813

dbus-x11-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: b3bab6b4be7525cce7cdac4ef5285bae019c14f97af15d66fcf26384d079c0f0

dbus-x11-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 76c3a9c650fc6adf9a9e7de14dd7897bef98a57ed1e68873e895d5ecef715e0f

dbus-x11-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 76c3a9c650fc6adf9a9e7de14dd7897bef98a57ed1e68873e895d5ecef715e0f

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

x86_64

dbus-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: acf1894dc5707ab8f656d64ef386857469ad311503fba8dbb8ebf224cb07aaf1

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 74d5ac38eb712179626f872c3b976c2c7ce8be2d16746e99bfabe5cbe0237980

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-devel-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 64147c76a110bf2696ab6aa123407104533cd898d6681bcdf0ea734eb830adb6

dbus-devel-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e45e8bd8e9d3f50088eeed0ec4e1acb831e35c004598b411570c6d2176b19f45

dbus-libs-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 07512ec6cfb84826cd6c3595db42130c3397ba786be11831e232628730c0e171

dbus-libs-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 14a05d25d06efa65ef246182d494daffa83993a849089e2eb37aa24572f06281

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tools-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e8f032cc836aa435ea20f153d9038b6d957102e20af54572dde6dcd70ba3f0a2

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-x11-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 1d40129106bfb5ab222cd66075b5baccb13600cee77935eec146f6ade8a6f706

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

aarch64

dbus-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 427b016625786516c90e723eb2e6840192f064a0ac20b8eb27dc85c96dee6366

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: a729d5ed00a6e6f678413814df859e4058f428ffcf2c77e3838a10efb67bd2c9

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 9e13fe7d74dfc597055164273a784d80cc33a761c25304d2b1b2da2175b69052

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 9e13fe7d74dfc597055164273a784d80cc33a761c25304d2b1b2da2175b69052

dbus-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: e43fb2e780ef77b08350459396c69b4f102bf73e3160d60c878fe8b45355d7a7

dbus-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: e43fb2e780ef77b08350459396c69b4f102bf73e3160d60c878fe8b45355d7a7

dbus-debugsource-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 93682fd921285cb0d0018746a8c401e2c08f7b59e774edcab3631d96e6b51519

dbus-debugsource-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 93682fd921285cb0d0018746a8c401e2c08f7b59e774edcab3631d96e6b51519

dbus-devel-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 3c27cb8f28df35192b9b5fce29be873a38d13de2443772168fa5519d18ad9aa7

dbus-libs-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 4fc3553b89d23106000ebbe86787e5756451b13342dd44ac24a24fdd966d1008

dbus-libs-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: a1a3816b0d37b1414f6a1cc6effc31e8b9adc55419ea0573db1bade7d55909b0

dbus-libs-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: a1a3816b0d37b1414f6a1cc6effc31e8b9adc55419ea0573db1bade7d55909b0

dbus-tests-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 120d1ec99497277bb473fd553cf699870d358af17432ab7662a4c0e232d3d492

dbus-tests-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 120d1ec99497277bb473fd553cf699870d358af17432ab7662a4c0e232d3d492

dbus-tools-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 1704f8bf04528e0bf6b63cf49248d004e5e15df1b68eb8787c62a5afc7d6dc03

dbus-tools-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 7301b1965a53353ad32d8e651ae3088a2824e9ecbe5d9769a98a8e6724b208a3

dbus-tools-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 7301b1965a53353ad32d8e651ae3088a2824e9ecbe5d9769a98a8e6724b208a3

dbus-x11-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 3a69c6bf0bc51ed6e2a97ccdc026b9239d2c546d0d341b883e935711fc9b8083

dbus-x11-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 6124058efc1894917d8292f01cafeebdbd008f07d3de66d1a4b16ea1fcf6a6d2

dbus-x11-debuginfo-1.12.8-18.el8_6.2.aarch64.rpm

SHA-256: 6124058efc1894917d8292f01cafeebdbd008f07d3de66d1a4b16ea1fcf6a6d2

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

ppc64le

dbus-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: b73a77eda9958bf22977d0ebd30d08e9f0d8a9092de28400e7d774846f9e4e91

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 6b1c7dedffedc7136218179ca574aa567a65e2744096996639738ef54a3873c4

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 57958fa5deb95d07f1e0741f13df9eb7640dabf9e4ee1a12a403a80457655419

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 57958fa5deb95d07f1e0741f13df9eb7640dabf9e4ee1a12a403a80457655419

dbus-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 7c7bac46a2c4e45da241c1029a62448b08120d58e5a69f6ec5164a2dc9eef414

dbus-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 7c7bac46a2c4e45da241c1029a62448b08120d58e5a69f6ec5164a2dc9eef414

dbus-debugsource-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 54bbe49e90359fc654bf265ef1bc9f0e208ede4059ead74a3cd842faf9fc76e0

dbus-debugsource-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 54bbe49e90359fc654bf265ef1bc9f0e208ede4059ead74a3cd842faf9fc76e0

dbus-devel-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 67e3dd4296f4a0c6ba7a9113558afe91fbfa9be11059c11fd6dda6edbc0cae24

dbus-libs-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: c7177b3839c5a5f515917cd7e68f900f89385cde5d13b8f1ccc7944939e0ffc5

dbus-libs-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 45b40bf7b514d08be428729b5b9242a6906b17f50f4f0560528846391747819f

dbus-libs-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 45b40bf7b514d08be428729b5b9242a6906b17f50f4f0560528846391747819f

dbus-tests-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: e8b148e30e6ae84f4878e14ae8977819e2061f2f3416497820341b76dd357d74

dbus-tests-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: e8b148e30e6ae84f4878e14ae8977819e2061f2f3416497820341b76dd357d74

dbus-tools-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 327d3be73342bf32c9bd6ce17b27933e323afbfca0ca81a74d7617df1f2bd1a6

dbus-tools-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: f44b81f48d233d448de6be8ef4544935d4c4ec2807e5f3533040f657a0abd813

dbus-tools-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: f44b81f48d233d448de6be8ef4544935d4c4ec2807e5f3533040f657a0abd813

dbus-x11-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: b3bab6b4be7525cce7cdac4ef5285bae019c14f97af15d66fcf26384d079c0f0

dbus-x11-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 76c3a9c650fc6adf9a9e7de14dd7897bef98a57ed1e68873e895d5ecef715e0f

dbus-x11-debuginfo-1.12.8-18.el8_6.2.ppc64le.rpm

SHA-256: 76c3a9c650fc6adf9a9e7de14dd7897bef98a57ed1e68873e895d5ecef715e0f

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

dbus-1.12.8-18.el8_6.2.src.rpm

SHA-256: f6ea0cc10004914ce740c2605a1f86f8a0dca7395e29a6767bf5d511b14d1a09

x86_64

dbus-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: acf1894dc5707ab8f656d64ef386857469ad311503fba8dbb8ebf224cb07aaf1

dbus-common-1.12.8-18.el8_6.2.noarch.rpm

SHA-256: cf070219c7f96ad0cfa45d034a81502c96595db8ae75a214964d7506e2b9d13e

dbus-daemon-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 74d5ac38eb712179626f872c3b976c2c7ce8be2d16746e99bfabe5cbe0237980

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: f67d613600dd6626e818949da2564f90fa7c6f437522276565235b748817b805

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-daemon-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: ba6228be3de1cbec27af0ae0d5820a01d0b1dbdffd37457e9a12b35855986048

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 6098393aa1fc80bd4f5cdb1838b2d9478f515161f6b5855ba31e2f8632c99050

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a1e76b0b1dd086addaa728c3577a491399253485faf9a6087bec39f4dc7722a6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.i686.rpm

SHA-256: c221919d6df4e3f385865f92eb8e5c0b7d0629be38fdc33ee5fe4abcf0372fb6

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-debugsource-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 2c039c2ca82ab5a87b0bef1df764a97712a78512d6f7fe44f3d390829cadc3f9

dbus-devel-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 64147c76a110bf2696ab6aa123407104533cd898d6681bcdf0ea734eb830adb6

dbus-devel-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e45e8bd8e9d3f50088eeed0ec4e1acb831e35c004598b411570c6d2176b19f45

dbus-libs-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 07512ec6cfb84826cd6c3595db42130c3397ba786be11831e232628730c0e171

dbus-libs-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 14a05d25d06efa65ef246182d494daffa83993a849089e2eb37aa24572f06281

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 8ccfff1f782b4e59fe3fafe1a0915605320d177bb69fcce36d5ad0fd7ee799e3

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-libs-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 0cbcccf081d7e1f2b667fef6bd64a22cfb4d73c9a32e9e192e32df5304ab9eeb

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 53eba5c2551cd0ee9002f73b69cfa0a6b11570eeb8fd8355e348fdfd7f58eb6e

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tests-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 84f849665b632887b1b1f63d0ec7762969bcbc7470f0a1a5e190bb4b98da912c

dbus-tools-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: e8f032cc836aa435ea20f153d9038b6d957102e20af54572dde6dcd70ba3f0a2

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 23f21e183b30a4e3ad12746f37cdd3f37d933c3b1578d08f71784ccdac9b64d0

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-tools-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 8ea8adfb051d857cbbcf8d9a49a7ba6401477c9de56bd10fc19d3b28d65cabe8

dbus-x11-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: 1d40129106bfb5ab222cd66075b5baccb13600cee77935eec146f6ade8a6f706

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.i686.rpm

SHA-256: 1d25b8ca40b16277be536bd09c41ae6bec267bbc37b6868e5ce822cb9e4c776c

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

dbus-x11-debuginfo-1.12.8-18.el8_6.2.x86_64.rpm

SHA-256: a98538365a432908ad983f11200afb3489b70e10610cd8440ac54b14258a13b8

Related news

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1448: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.2 security update

Red Hat OpenShift Service Mesh Containers for 2.3.2 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server t...

RHSA-2023:1286: Red Hat Security Advisory: Migration Toolkit for Runtimes security bug fix and enhancement update

Migration Toolkit for Runtimes 1.0.2 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31690: A flaw was found in the Spring Security framework. Spring Security could allow a remote attacker to gain elevated privileges on the system. By modifying a request initiated by the Client (via the browser) to the Authorization Server, an attacker can gain elevated privileges on the system. * CVE-2022-41966: A flaw was found in the xstream package. This flaw allows an atta...

RHSA-2023:1174: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022...

RHSA-2023:0934: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.0.1 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to...

Red Hat Security Advisory 2023-0795-01

Red Hat Security Advisory 2023-0795-01 - Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6.

Red Hat Security Advisory 2023-0794-01

Red Hat Security Advisory 2023-0794-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:0795: Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes

Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.

RHSA-2023:0794: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates

Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload i...

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0634-01

Red Hat Security Advisory 2023-0634-01 - Logging Subsystem 5.6.1 - Red Hat OpenShift. Issues addressed include a denial of service vulnerability.

RHSA-2023:0634: Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update

Logging Subsystem 5.6.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability. * CVE-2022-46175: A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned f...

RHSA-2023:0693: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.7 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method. * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw a...

RHSA-2023:0630: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.7.0 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. * CVE-2022-30629: A flaw was found in the crypto/tls golang pa...

RHSA-2023:0542: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update

Red Hat OpenShift Service Mesh 2.3.1 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-3962: kiali: error message spoofing in kiali UI * CVE-2022-27664: golang: ...

Red Hat Security Advisory 2023-0468-01

Red Hat Security Advisory 2023-0468-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.

Red Hat Security Advisory 2023-0466-01

Red Hat Security Advisory 2023-0466-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.

Red Hat Security Advisory 2023-0467-01

Red Hat Security Advisory 2023-0467-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a bypass vulnerability.

RHSA-2023:0468: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.5.9 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-22482: ArgoCD: JWT audience claim is not verified

RHSA-2023:0467: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-22482: ArgoCD: JWT audience claim is not verified * CVE-2023-22736: argocd: Controller reconciles apps outside configured namespaces when sharding is enabled

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

Red Hat Security Advisory 2023-0096-01

Red Hat Security Advisory 2023-0096-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Red Hat Security Advisory 2022-8893-01

Red Hat Security Advisory 2022-8893-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.20.

RHSA-2022:8893: Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update

Red Hat OpenShift Container Platform release 4.11.20 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server

Red Hat Security Advisory 2022-8977-01

Red Hat Security Advisory 2022-8977-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

RHSA-2022:8977: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets * CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type * CVE-2022-42012: dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness co...

Red Hat Security Advisory 2022-8812-01

Red Hat Security Advisory 2022-8812-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.