Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8977: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
  • CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
  • CVE-2022-42012: dbus: _dbus_marshal_byteswap doesn’t process fds in messages with “foreign” endianness correctly
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Moderate: dbus security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for dbus is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

  • dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
  • dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
  • dbus: `_dbus_marshal_byteswap` doesn’t process fds in messages with “foreign” endianness correctly (CVE-2022-42012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2133616 - CVE-2022-42010 dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
  • BZ - 2133617 - CVE-2022-42011 dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
  • BZ - 2133618 - CVE-2022-42012 dbus: `_dbus_marshal_byteswap` doesn’t process fds in messages with “foreign” endianness correctly

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

x86_64

dbus-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: e88eb9af1f576e17f7d7b86ba77494ffdcf49e95c75a53f7138e481c709affa3

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 94bd070c58e55d62448ab1b6f25ca2ddeb6147e9e3903227a3994d495f0c8cd0

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 35af0b9a55e7ea54eaca69d77284aa19a4cb77a6fab1e4d11073c8464fb45fcf

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 35af0b9a55e7ea54eaca69d77284aa19a4cb77a6fab1e4d11073c8464fb45fcf

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 42bb58013e19932496bb5c2e6a54f14fae1d56a1da580009c6a5697faa31f7b6

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 42bb58013e19932496bb5c2e6a54f14fae1d56a1da580009c6a5697faa31f7b6

dbus-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: cda3fd18790297ac05eb9f572f56f7bc5c761e98801da1e0ec94c879f6fd20ed

dbus-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: cda3fd18790297ac05eb9f572f56f7bc5c761e98801da1e0ec94c879f6fd20ed

dbus-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6aed48c96362f7ff726d3e41b909768bf02d1acbcc1e52b15b84d678b11df55e

dbus-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6aed48c96362f7ff726d3e41b909768bf02d1acbcc1e52b15b84d678b11df55e

dbus-debugsource-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 3aa829107961928f81f4c60d21a5ca029239f5004b3671f6f758734f7d76c207

dbus-debugsource-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 3aa829107961928f81f4c60d21a5ca029239f5004b3671f6f758734f7d76c207

dbus-debugsource-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6e66a928c50f7d7e6009dd77eccf2d1b472f7e14edc503fa3cfb9f62b2a8c868

dbus-debugsource-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6e66a928c50f7d7e6009dd77eccf2d1b472f7e14edc503fa3cfb9f62b2a8c868

dbus-devel-1.12.20-5.el9_0.1.i686.rpm

SHA-256: db6bee155fb0b2cc8b556b93942fe3c8c224213e304f634aa588e507edeedcf2

dbus-devel-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 930bd1d06591e82ee5bc1406a4c8806b2b068a29e39ab41579c2f86a0aa0058d

dbus-libs-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 704c1cf38b89e933626c3f13cfa80104de0093bdeab2f1972d29c6e47324895e

dbus-libs-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: ed0fb4864d2f833dd1cd7d033491f4145797bfa688acd956a38b5c592429dbe7

dbus-libs-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 71fbd26bbd31d80c7c5987e5b21892939180ad052e786a16fd810c6d81689e28

dbus-libs-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 71fbd26bbd31d80c7c5987e5b21892939180ad052e786a16fd810c6d81689e28

dbus-libs-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 880bfadc895a86ef0070d94ba41dd385ebaf53aa465c8b01aafca067f4487c16

dbus-libs-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 880bfadc895a86ef0070d94ba41dd385ebaf53aa465c8b01aafca067f4487c16

dbus-tests-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 38cc033162454e869f60899d6a96a37f0fc45e6321849f42ecc6660e8a00294d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 38cc033162454e869f60899d6a96a37f0fc45e6321849f42ecc6660e8a00294d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: d4bf90dcb50269a9f98070d6c660f8a0ef537f1ca3b6ce21f6e6235076f41497

dbus-tests-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: d4bf90dcb50269a9f98070d6c660f8a0ef537f1ca3b6ce21f6e6235076f41497

dbus-tools-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 2ea87a5059e3f37e2655140591a16f0a2ffc679a6e59a74da7925691959b1886

dbus-tools-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 8556712eb27e89ee4a6097c880b8523f6fc1483302d73dd10b1169fda55256e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 8556712eb27e89ee4a6097c880b8523f6fc1483302d73dd10b1169fda55256e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: dbc4ad1dc3f89b02ecbb199c233b7a1c29ea4679c55a2bfc5296a75a6a7cf746

dbus-tools-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: dbc4ad1dc3f89b02ecbb199c233b7a1c29ea4679c55a2bfc5296a75a6a7cf746

dbus-x11-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: c5c906fd22cd023445972d7b4cf367e78a1800af0b73978e7cd3b7ed2807b9f1

dbus-x11-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: d758b21aa40c6ae51acf03a848c115548455ff312ad2d878f858c54e4c0312bf

dbus-x11-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: d758b21aa40c6ae51acf03a848c115548455ff312ad2d878f858c54e4c0312bf

dbus-x11-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6d44123a3534b7ccb7dfca02752f391afd97401df41d24bc0f4697f8d4720a26

dbus-x11-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6d44123a3534b7ccb7dfca02752f391afd97401df41d24bc0f4697f8d4720a26

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

s390x

dbus-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 44094c8ba3095183a74a982d9978268b6ea0b105a8fab231691897d453c3902e

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ecbe94911be632a3b6cc96d6fa66aa2d104f1843226337be2f18494b2b8a3b3

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 50144c8954d726ac1940bd4ced13369354284e3d18d5e5c3b17f8cdf9ad0571f

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 50144c8954d726ac1940bd4ced13369354284e3d18d5e5c3b17f8cdf9ad0571f

dbus-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 130c3cda9177f3f6aa596e0591f1e9f4b5e5d709ddd995f55c79ce7b1b90ddf6

dbus-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 130c3cda9177f3f6aa596e0591f1e9f4b5e5d709ddd995f55c79ce7b1b90ddf6

dbus-debugsource-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ca51e413b4b1a4513f5655ab7f22415f0d06024bba1d5013c311f0f0608ad0c

dbus-debugsource-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ca51e413b4b1a4513f5655ab7f22415f0d06024bba1d5013c311f0f0608ad0c

dbus-devel-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a410e8bd6f244538098b223c09d57a695ed53d91490918122da2c656e9892684

dbus-libs-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 768ba3a8d4684a30ace2ca373a78d5ddfbc91f82ef9cb889b63b92c4dbc19281

dbus-libs-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: cb2e882db4a8917c5cfdc1b5aa202f6b7642f22574cb9f60d89fe654f677cb29

dbus-libs-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: cb2e882db4a8917c5cfdc1b5aa202f6b7642f22574cb9f60d89fe654f677cb29

dbus-tests-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: fd016b7b12b064d7777858832063595405ba14b3e9c4968dd25e2f749b12dd42

dbus-tests-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: fd016b7b12b064d7777858832063595405ba14b3e9c4968dd25e2f749b12dd42

dbus-tools-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 55d0b4fbd4414f1137db2480fcec3dc29afa10e495d5999237fe9824de4a6c82

dbus-tools-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: e5ac0aa4f85a98598398bb784ceac6368e61b4ce7f9ed81ae18353f4922c3e14

dbus-tools-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: e5ac0aa4f85a98598398bb784ceac6368e61b4ce7f9ed81ae18353f4922c3e14

dbus-x11-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 1de37b1df99c618b33a8f6fe7086f5dc18f3f9977bed279883ca424db5da5638

dbus-x11-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a39b01b64d3340d64bd43c90f4b5599438d947ab4664fb72693104af861df768

dbus-x11-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a39b01b64d3340d64bd43c90f4b5599438d947ab4664fb72693104af861df768

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

ppc64le

dbus-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 0172cd2bd763fc0c115894e0ecc5371aa7a3a30d2a307c52fd8c6d6150cc50ca

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: f5b6d26cf5ebda505ebf41fb897ebdd9f7eb72da6da435ce7fe0d49537152cba

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 234366656d989e4a7998234b157b8f1d4a1bc6c6931bcfd0c2d3c251cf564b34

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 234366656d989e4a7998234b157b8f1d4a1bc6c6931bcfd0c2d3c251cf564b34

dbus-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: b67e78844c0fe3a174f99664dcb0e224d10094c361ff47d4ba6f1c0f09b1d738

dbus-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: b67e78844c0fe3a174f99664dcb0e224d10094c361ff47d4ba6f1c0f09b1d738

dbus-debugsource-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 9ed97291fa73d2f3458332906f4e6a5529f6f21c08fae583d4eea5737a82466b

dbus-debugsource-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 9ed97291fa73d2f3458332906f4e6a5529f6f21c08fae583d4eea5737a82466b

dbus-devel-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: dc09344e3b88ff3bb3d7f6e5db18b24193844b97bf7a0a6384dc3581c5de3526

dbus-libs-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 3e98284fb441599b8e9aa56e551e41c1f6d24b20701c7d9952643a365acadcb8

dbus-libs-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: c9abec38dd842eb7daadb8034380097d402bc5b607e5c625d5edc6671676db94

dbus-libs-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: c9abec38dd842eb7daadb8034380097d402bc5b607e5c625d5edc6671676db94

dbus-tests-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: aec3e92cd131233e6105d7827ae1c80eed71505635f218ccfa82df263b95d603

dbus-tests-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: aec3e92cd131233e6105d7827ae1c80eed71505635f218ccfa82df263b95d603

dbus-tools-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a8c3af9a5d257d8eb0b8fccb95f27c783991e65896181ff2d98317b9620f0354

dbus-tools-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 68ac9c07ae1f3ffb2d5460aa4da247fdeae498c033fe5a0dba4fb0ec6acfc2e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 68ac9c07ae1f3ffb2d5460aa4da247fdeae498c033fe5a0dba4fb0ec6acfc2e4

dbus-x11-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 4bcd2cb368c8f5820f92bc4e3e7aef10744346c35b45d610094506562248fe83

dbus-x11-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a193ed1bc284d0e3a1dc373ad28eb629742c270ddcb283fbd8310d885617c245

dbus-x11-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a193ed1bc284d0e3a1dc373ad28eb629742c270ddcb283fbd8310d885617c245

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

aarch64

dbus-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 1661c37a42f01da11625413d6f5a957a6d6da2fcad8b77eaf63065a2604a9bb5

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: fbe8bc23e41114c933b057f75c607447cbc860f3f272154117f6a23a5288ec2d

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 657847fac5a919d1352fdb77d578e2a1bbb09c1b8393e17cd31d21030f1a2db6

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 657847fac5a919d1352fdb77d578e2a1bbb09c1b8393e17cd31d21030f1a2db6

dbus-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: b4fee9457d59b1dd07efe2b08420fa806fd440f10ca70be58751b46924da3bdd

dbus-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: b4fee9457d59b1dd07efe2b08420fa806fd440f10ca70be58751b46924da3bdd

dbus-debugsource-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 04074dd2f11231315d94da790d5fde43b788e11e80704ee0f01b3d55d5f423e9

dbus-debugsource-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 04074dd2f11231315d94da790d5fde43b788e11e80704ee0f01b3d55d5f423e9

dbus-devel-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 9a89adf2f62bb4d34871930372fe8330515945c8054211b9c8ce8c168e50a7d8

dbus-libs-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 70fb8032a6ceaff9ddc6ae55d09db2466c814e10bcc92d7875757671f4026fbf

dbus-libs-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: c4f533e2d4c1e336f02032acd23deb76347be3a80c0e0504698fdc40ded29c0e

dbus-libs-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: c4f533e2d4c1e336f02032acd23deb76347be3a80c0e0504698fdc40ded29c0e

dbus-tests-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 69c597f0a66b4f63d77054e958ba135799d449eb4f99d50176fb8965f7c60e3d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 69c597f0a66b4f63d77054e958ba135799d449eb4f99d50176fb8965f7c60e3d

dbus-tools-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 6977b415d8d7e78eaaaa7b3640fcaffe949daea08f4d3e51c68560dbb0f96db8

dbus-tools-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 56d950715d082f06cc49663101325dfc16bc9410d3a4323f49889bf41727c39d

dbus-tools-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 56d950715d082f06cc49663101325dfc16bc9410d3a4323f49889bf41727c39d

dbus-x11-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: a6f160cef74ff5321ebf52fea4456d31bdb2026e0a9a2b43c1c2c5228c62a15c

dbus-x11-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 731c5c3e670bc9f9d6bf99dcb6f6d810f8bdf2b18bac50b97ce900bc4436c114

dbus-x11-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 731c5c3e670bc9f9d6bf99dcb6f6d810f8bdf2b18bac50b97ce900bc4436c114

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

ppc64le

dbus-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 0172cd2bd763fc0c115894e0ecc5371aa7a3a30d2a307c52fd8c6d6150cc50ca

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: f5b6d26cf5ebda505ebf41fb897ebdd9f7eb72da6da435ce7fe0d49537152cba

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 234366656d989e4a7998234b157b8f1d4a1bc6c6931bcfd0c2d3c251cf564b34

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 234366656d989e4a7998234b157b8f1d4a1bc6c6931bcfd0c2d3c251cf564b34

dbus-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: b67e78844c0fe3a174f99664dcb0e224d10094c361ff47d4ba6f1c0f09b1d738

dbus-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: b67e78844c0fe3a174f99664dcb0e224d10094c361ff47d4ba6f1c0f09b1d738

dbus-debugsource-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 9ed97291fa73d2f3458332906f4e6a5529f6f21c08fae583d4eea5737a82466b

dbus-debugsource-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 9ed97291fa73d2f3458332906f4e6a5529f6f21c08fae583d4eea5737a82466b

dbus-devel-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: dc09344e3b88ff3bb3d7f6e5db18b24193844b97bf7a0a6384dc3581c5de3526

dbus-libs-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 3e98284fb441599b8e9aa56e551e41c1f6d24b20701c7d9952643a365acadcb8

dbus-libs-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: c9abec38dd842eb7daadb8034380097d402bc5b607e5c625d5edc6671676db94

dbus-libs-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: c9abec38dd842eb7daadb8034380097d402bc5b607e5c625d5edc6671676db94

dbus-tests-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: aec3e92cd131233e6105d7827ae1c80eed71505635f218ccfa82df263b95d603

dbus-tests-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: aec3e92cd131233e6105d7827ae1c80eed71505635f218ccfa82df263b95d603

dbus-tools-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a8c3af9a5d257d8eb0b8fccb95f27c783991e65896181ff2d98317b9620f0354

dbus-tools-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 68ac9c07ae1f3ffb2d5460aa4da247fdeae498c033fe5a0dba4fb0ec6acfc2e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 68ac9c07ae1f3ffb2d5460aa4da247fdeae498c033fe5a0dba4fb0ec6acfc2e4

dbus-x11-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: 4bcd2cb368c8f5820f92bc4e3e7aef10744346c35b45d610094506562248fe83

dbus-x11-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a193ed1bc284d0e3a1dc373ad28eb629742c270ddcb283fbd8310d885617c245

dbus-x11-debuginfo-1.12.20-5.el9_0.1.ppc64le.rpm

SHA-256: a193ed1bc284d0e3a1dc373ad28eb629742c270ddcb283fbd8310d885617c245

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

x86_64

dbus-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: e88eb9af1f576e17f7d7b86ba77494ffdcf49e95c75a53f7138e481c709affa3

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 94bd070c58e55d62448ab1b6f25ca2ddeb6147e9e3903227a3994d495f0c8cd0

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 35af0b9a55e7ea54eaca69d77284aa19a4cb77a6fab1e4d11073c8464fb45fcf

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 35af0b9a55e7ea54eaca69d77284aa19a4cb77a6fab1e4d11073c8464fb45fcf

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 42bb58013e19932496bb5c2e6a54f14fae1d56a1da580009c6a5697faa31f7b6

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 42bb58013e19932496bb5c2e6a54f14fae1d56a1da580009c6a5697faa31f7b6

dbus-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: cda3fd18790297ac05eb9f572f56f7bc5c761e98801da1e0ec94c879f6fd20ed

dbus-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: cda3fd18790297ac05eb9f572f56f7bc5c761e98801da1e0ec94c879f6fd20ed

dbus-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6aed48c96362f7ff726d3e41b909768bf02d1acbcc1e52b15b84d678b11df55e

dbus-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6aed48c96362f7ff726d3e41b909768bf02d1acbcc1e52b15b84d678b11df55e

dbus-debugsource-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 3aa829107961928f81f4c60d21a5ca029239f5004b3671f6f758734f7d76c207

dbus-debugsource-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 3aa829107961928f81f4c60d21a5ca029239f5004b3671f6f758734f7d76c207

dbus-debugsource-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6e66a928c50f7d7e6009dd77eccf2d1b472f7e14edc503fa3cfb9f62b2a8c868

dbus-debugsource-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6e66a928c50f7d7e6009dd77eccf2d1b472f7e14edc503fa3cfb9f62b2a8c868

dbus-devel-1.12.20-5.el9_0.1.i686.rpm

SHA-256: db6bee155fb0b2cc8b556b93942fe3c8c224213e304f634aa588e507edeedcf2

dbus-devel-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 930bd1d06591e82ee5bc1406a4c8806b2b068a29e39ab41579c2f86a0aa0058d

dbus-libs-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 704c1cf38b89e933626c3f13cfa80104de0093bdeab2f1972d29c6e47324895e

dbus-libs-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: ed0fb4864d2f833dd1cd7d033491f4145797bfa688acd956a38b5c592429dbe7

dbus-libs-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 71fbd26bbd31d80c7c5987e5b21892939180ad052e786a16fd810c6d81689e28

dbus-libs-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 71fbd26bbd31d80c7c5987e5b21892939180ad052e786a16fd810c6d81689e28

dbus-libs-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 880bfadc895a86ef0070d94ba41dd385ebaf53aa465c8b01aafca067f4487c16

dbus-libs-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 880bfadc895a86ef0070d94ba41dd385ebaf53aa465c8b01aafca067f4487c16

dbus-tests-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 38cc033162454e869f60899d6a96a37f0fc45e6321849f42ecc6660e8a00294d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 38cc033162454e869f60899d6a96a37f0fc45e6321849f42ecc6660e8a00294d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: d4bf90dcb50269a9f98070d6c660f8a0ef537f1ca3b6ce21f6e6235076f41497

dbus-tests-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: d4bf90dcb50269a9f98070d6c660f8a0ef537f1ca3b6ce21f6e6235076f41497

dbus-tools-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 2ea87a5059e3f37e2655140591a16f0a2ffc679a6e59a74da7925691959b1886

dbus-tools-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 8556712eb27e89ee4a6097c880b8523f6fc1483302d73dd10b1169fda55256e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: 8556712eb27e89ee4a6097c880b8523f6fc1483302d73dd10b1169fda55256e4

dbus-tools-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: dbc4ad1dc3f89b02ecbb199c233b7a1c29ea4679c55a2bfc5296a75a6a7cf746

dbus-tools-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: dbc4ad1dc3f89b02ecbb199c233b7a1c29ea4679c55a2bfc5296a75a6a7cf746

dbus-x11-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: c5c906fd22cd023445972d7b4cf367e78a1800af0b73978e7cd3b7ed2807b9f1

dbus-x11-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: d758b21aa40c6ae51acf03a848c115548455ff312ad2d878f858c54e4c0312bf

dbus-x11-debuginfo-1.12.20-5.el9_0.1.i686.rpm

SHA-256: d758b21aa40c6ae51acf03a848c115548455ff312ad2d878f858c54e4c0312bf

dbus-x11-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6d44123a3534b7ccb7dfca02752f391afd97401df41d24bc0f4697f8d4720a26

dbus-x11-debuginfo-1.12.20-5.el9_0.1.x86_64.rpm

SHA-256: 6d44123a3534b7ccb7dfca02752f391afd97401df41d24bc0f4697f8d4720a26

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

aarch64

dbus-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 1661c37a42f01da11625413d6f5a957a6d6da2fcad8b77eaf63065a2604a9bb5

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: fbe8bc23e41114c933b057f75c607447cbc860f3f272154117f6a23a5288ec2d

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 657847fac5a919d1352fdb77d578e2a1bbb09c1b8393e17cd31d21030f1a2db6

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 657847fac5a919d1352fdb77d578e2a1bbb09c1b8393e17cd31d21030f1a2db6

dbus-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: b4fee9457d59b1dd07efe2b08420fa806fd440f10ca70be58751b46924da3bdd

dbus-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: b4fee9457d59b1dd07efe2b08420fa806fd440f10ca70be58751b46924da3bdd

dbus-debugsource-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 04074dd2f11231315d94da790d5fde43b788e11e80704ee0f01b3d55d5f423e9

dbus-debugsource-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 04074dd2f11231315d94da790d5fde43b788e11e80704ee0f01b3d55d5f423e9

dbus-devel-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 9a89adf2f62bb4d34871930372fe8330515945c8054211b9c8ce8c168e50a7d8

dbus-libs-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 70fb8032a6ceaff9ddc6ae55d09db2466c814e10bcc92d7875757671f4026fbf

dbus-libs-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: c4f533e2d4c1e336f02032acd23deb76347be3a80c0e0504698fdc40ded29c0e

dbus-libs-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: c4f533e2d4c1e336f02032acd23deb76347be3a80c0e0504698fdc40ded29c0e

dbus-tests-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 69c597f0a66b4f63d77054e958ba135799d449eb4f99d50176fb8965f7c60e3d

dbus-tests-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 69c597f0a66b4f63d77054e958ba135799d449eb4f99d50176fb8965f7c60e3d

dbus-tools-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 6977b415d8d7e78eaaaa7b3640fcaffe949daea08f4d3e51c68560dbb0f96db8

dbus-tools-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 56d950715d082f06cc49663101325dfc16bc9410d3a4323f49889bf41727c39d

dbus-tools-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 56d950715d082f06cc49663101325dfc16bc9410d3a4323f49889bf41727c39d

dbus-x11-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: a6f160cef74ff5321ebf52fea4456d31bdb2026e0a9a2b43c1c2c5228c62a15c

dbus-x11-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 731c5c3e670bc9f9d6bf99dcb6f6d810f8bdf2b18bac50b97ce900bc4436c114

dbus-x11-debuginfo-1.12.20-5.el9_0.1.aarch64.rpm

SHA-256: 731c5c3e670bc9f9d6bf99dcb6f6d810f8bdf2b18bac50b97ce900bc4436c114

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

dbus-1.12.20-5.el9_0.1.src.rpm

SHA-256: 08597f15e7f81597449e728d23e6bf21de42b6e8670e37329b0be548a930e5b0

s390x

dbus-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 44094c8ba3095183a74a982d9978268b6ea0b105a8fab231691897d453c3902e

dbus-common-1.12.20-5.el9_0.1.noarch.rpm

SHA-256: ba82a08ce632a0671061bb188c76460255f056ca00aa6b380b58ec1f61593210

dbus-daemon-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ecbe94911be632a3b6cc96d6fa66aa2d104f1843226337be2f18494b2b8a3b3

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 50144c8954d726ac1940bd4ced13369354284e3d18d5e5c3b17f8cdf9ad0571f

dbus-daemon-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 50144c8954d726ac1940bd4ced13369354284e3d18d5e5c3b17f8cdf9ad0571f

dbus-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 130c3cda9177f3f6aa596e0591f1e9f4b5e5d709ddd995f55c79ce7b1b90ddf6

dbus-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 130c3cda9177f3f6aa596e0591f1e9f4b5e5d709ddd995f55c79ce7b1b90ddf6

dbus-debugsource-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ca51e413b4b1a4513f5655ab7f22415f0d06024bba1d5013c311f0f0608ad0c

dbus-debugsource-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 2ca51e413b4b1a4513f5655ab7f22415f0d06024bba1d5013c311f0f0608ad0c

dbus-devel-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a410e8bd6f244538098b223c09d57a695ed53d91490918122da2c656e9892684

dbus-libs-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 768ba3a8d4684a30ace2ca373a78d5ddfbc91f82ef9cb889b63b92c4dbc19281

dbus-libs-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: cb2e882db4a8917c5cfdc1b5aa202f6b7642f22574cb9f60d89fe654f677cb29

dbus-libs-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: cb2e882db4a8917c5cfdc1b5aa202f6b7642f22574cb9f60d89fe654f677cb29

dbus-tests-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: fd016b7b12b064d7777858832063595405ba14b3e9c4968dd25e2f749b12dd42

dbus-tests-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: fd016b7b12b064d7777858832063595405ba14b3e9c4968dd25e2f749b12dd42

dbus-tools-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 55d0b4fbd4414f1137db2480fcec3dc29afa10e495d5999237fe9824de4a6c82

dbus-tools-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: e5ac0aa4f85a98598398bb784ceac6368e61b4ce7f9ed81ae18353f4922c3e14

dbus-tools-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: e5ac0aa4f85a98598398bb784ceac6368e61b4ce7f9ed81ae18353f4922c3e14

dbus-x11-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: 1de37b1df99c618b33a8f6fe7086f5dc18f3f9977bed279883ca424db5da5638

dbus-x11-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a39b01b64d3340d64bd43c90f4b5599438d947ab4664fb72693104af861df768

dbus-x11-debuginfo-1.12.20-5.el9_0.1.s390x.rpm

SHA-256: a39b01b64d3340d64bd43c90f4b5599438d947ab4664fb72693104af861df768

Related news

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1448: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.2 security update

Red Hat OpenShift Service Mesh Containers for 2.3.2 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server t...

RHSA-2023:1286: Red Hat Security Advisory: Migration Toolkit for Runtimes security bug fix and enhancement update

Migration Toolkit for Runtimes 1.0.2 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31690: A flaw was found in the Spring Security framework. Spring Security could allow a remote attacker to gain elevated privileges on the system. By modifying a request initiated by the Client (via the browser) to the Authorization Server, an attacker can gain elevated privileges on the system. * CVE-2022-41966: A flaw was found in the xstream package. This flaw allows an atta...

RHSA-2023:1174: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022...

RHSA-2023:0934: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.0.1 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to...

RHSA-2023:0795: Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes

Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0634-01

Red Hat Security Advisory 2023-0634-01 - Logging Subsystem 5.6.1 - Red Hat OpenShift. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-0693-01

Red Hat Security Advisory 2023-0693-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2023:0630: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.7.0 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. * CVE-2022-30629: A flaw was found in the crypto/tls golang pa...

Red Hat Security Advisory 2023-0542-01

Red Hat Security Advisory 2023-0542-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release. Issues addressed include denial of service and spoofing vulnerabilities.

RHSA-2023:0542: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update

Red Hat OpenShift Service Mesh 2.3.1 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-3962: kiali: error message spoofing in kiali UI * CVE-2022-27664: golang: ...

Red Hat Security Advisory 2023-0468-01

Red Hat Security Advisory 2023-0468-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.

Red Hat Security Advisory 2023-0466-01

Red Hat Security Advisory 2023-0466-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.

Red Hat Security Advisory 2023-0467-01

Red Hat Security Advisory 2023-0467-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a bypass vulnerability.

RHSA-2023:0468: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.5.9 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-22482: ArgoCD: JWT audience claim is not verified

RHSA-2023:0467: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-22482: ArgoCD: JWT audience claim is not verified * CVE-2023-22736: argocd: Controller reconciles apps outside configured namespaces when sharding is enabled

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

Red Hat Security Advisory 2023-0096-01

Red Hat Security Advisory 2023-0096-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Red Hat Security Advisory 2022-8893-01

Red Hat Security Advisory 2022-8893-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.20.

RHSA-2022:8893: Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update

Red Hat OpenShift Container Platform release 4.11.20 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server

Red Hat Security Advisory 2022-8977-01

Red Hat Security Advisory 2022-8977-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Red Hat Security Advisory 2022-8812-01

Red Hat Security Advisory 2022-8812-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Red Hat Security Advisory 2022-8812-01

Red Hat Security Advisory 2022-8812-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Red Hat Security Advisory 2022-8812-01

Red Hat Security Advisory 2022-8812-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

RHSA-2022:8812: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets * CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type * CVE-2022-42012: dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness co...

RHSA-2022:8812: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets * CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type * CVE-2022-42012: dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness co...

RHSA-2022:8812: Red Hat Security Advisory: dbus security update

An update for dbus is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42010: dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets * CVE-2022-42011: dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type * CVE-2022-42012: dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness co...

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

Ubuntu Security Notice USN-5704-1

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.

CVE-2022-42012: security - dbus denial of service: CVE-2022-42010, -42011, -42012

An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.