-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: dbus-broker security update
Advisory ID:       RHSA-2022:6608-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6608
Issue date:        2022-09-20
CVE Names:         CVE-2022-31212 CVE-2022-31213 
====================================================================
1. Summary:

An update for dbus-broker is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64

3. Description:

dbus-broker is an implementation of a message bus as defined by the D-Bus
specification. Its aim is to provide high performance and reliability,
while keeping compatibility to the D-Bus reference implementation. It is
exclusively written for Linux systems, and makes use of many modern
features provided by recent Linux kernel releases.

Security Fix(es):

* dbus-broker: a stack buffer over-read if a malicious Exec line is
supplied (CVE-2022-31212)

* dbus-broker: null pointer reference when supplying a malformed XML config
file (CVE-2022-31213)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2094718 - CVE-2022-31212 dbus-broker: a stack buffer over-read if a malicious Exec line is supplied
2094722 - CVE-2022-31213 dbus-broker: null pointer reference when supplying a malformed XML config file

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 9):

Source:
dbus-broker-28-5.1.el9_0.src.rpm

aarch64:
dbus-broker-28-5.1.el9_0.aarch64.rpm
dbus-broker-debuginfo-28-5.1.el9_0.aarch64.rpm
dbus-broker-debugsource-28-5.1.el9_0.aarch64.rpm

ppc64le:
dbus-broker-28-5.1.el9_0.ppc64le.rpm
dbus-broker-debuginfo-28-5.1.el9_0.ppc64le.rpm
dbus-broker-debugsource-28-5.1.el9_0.ppc64le.rpm

s390x:
dbus-broker-28-5.1.el9_0.s390x.rpm
dbus-broker-debuginfo-28-5.1.el9_0.s390x.rpm
dbus-broker-debugsource-28-5.1.el9_0.s390x.rpm

x86_64:
dbus-broker-28-5.1.el9_0.x86_64.rpm
dbus-broker-debuginfo-28-5.1.el9_0.x86_64.rpm
dbus-broker-debugsource-28-5.1.el9_0.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-31212
https://access.redhat.com/security/cve/CVE-2022-31213
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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clNW
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-6608:01 Moderate: dbus-broker security update

An update for dbus-broker is now available for Red Hat Enterprise Linux 9

Summary

dbus-broker is an implementation of a message bus as defined by the D-Bus specification. Its aim is to provide high performance and reliability, while keeping compatibility to the D-Bus reference implementation. It is exclusively written for Linux systems, and makes use of many modern features provided by recent Linux kernel releases.
Security Fix(es):
* dbus-broker: a stack buffer over-read if a malicious Exec line is supplied (CVE-2022-31212)
* dbus-broker: null pointer reference when supplying a malformed XML config file (CVE-2022-31213)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-31212 https://access.redhat.com/security/cve/CVE-2022-31213 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux BaseOS (v. 9):
Source: dbus-broker-28-5.1.el9_0.src.rpm
aarch64: dbus-broker-28-5.1.el9_0.aarch64.rpm dbus-broker-debuginfo-28-5.1.el9_0.aarch64.rpm dbus-broker-debugsource-28-5.1.el9_0.aarch64.rpm
ppc64le: dbus-broker-28-5.1.el9_0.ppc64le.rpm dbus-broker-debuginfo-28-5.1.el9_0.ppc64le.rpm dbus-broker-debugsource-28-5.1.el9_0.ppc64le.rpm
s390x: dbus-broker-28-5.1.el9_0.s390x.rpm dbus-broker-debuginfo-28-5.1.el9_0.s390x.rpm dbus-broker-debugsource-28-5.1.el9_0.s390x.rpm
x86_64: dbus-broker-28-5.1.el9_0.x86_64.rpm dbus-broker-debuginfo-28-5.1.el9_0.x86_64.rpm dbus-broker-debugsource-28-5.1.el9_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:6608-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6608
Issued Date: : 2022-09-20
CVE Names: CVE-2022-31212 CVE-2022-31213

Topic

An update for dbus-broker is now available for Red Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2094718 - CVE-2022-31212 dbus-broker: a stack buffer over-read if a malicious Exec line is supplied

2094722 - CVE-2022-31213 dbus-broker: null pointer reference when supplying a malformed XML config file


Related News