Bugzilla – Bug 1204113
VUL-0: CVE-2022-42012: dbus-1: dbus-marshal-byteswap: Byte-swap Unix fd indexes if needed
Last modified: 2023-01-23 08:15:48 UTC
CVE-2022-42012 * A message in non-native endianness with out-of-band Unix file descriptors would cause a use-after-free and possible memory corruption in production builds, or an assertion failure in debug builds. This was a regression in version 1.3.0. (dbus#417, CVE-2022-42012, fixed by https://gitlab.freedesktop.org/dbus/dbus/-/commit/236f16e444e88a984cf12b09225e0f8efa6c5b44) References: https://security-tracker.debian.org/tracker/dbus http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42012 https://seclists.org/oss-sec/2022/q4/7 https://security-tracker.debian.org/tracker/DSA-5250-1 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004543 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005889
Should be fixed in all standard streams
This is an autogenerated message for OBS integration: This bug (1204113) was mentioned in https://build.opensuse.org/request/show/1031295 Factory / dbus-1
SUSE-SU-2022:3805-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1087072,1204111,1204112,1204113 CVE References: CVE-2022-42010,CVE-2022-42011,CVE-2022-42012 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 openSUSE Leap 15.3 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Manager Server 4.1 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Manager Retail Branch Server 4.1 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Manager Proxy 4.1 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Micro 5.2 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise Micro 5.1 (src): dbus-1-1.12.2-150100.8.14.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Enterprise Storage 7 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE Enterprise Storage 6 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 SUSE CaaS Platform 4.0 (src): dbus-1-1.12.2-150100.8.14.1, dbus-1-x11-1.12.2-150100.8.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3804-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1087072,1204111,1204112,1204113 CVE References: CVE-2022-42010,CVE-2022-42011,CVE-2022-42012 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): dbus-1-1.8.22-29.24.1, dbus-1-x11-1.8.22-29.24.1 SUSE OpenStack Cloud 9 (src): dbus-1-1.8.22-29.24.1, dbus-1-x11-1.8.22-29.24.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): dbus-1-1.8.22-29.24.1, dbus-1-x11-1.8.22-29.24.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): dbus-1-1.8.22-29.24.1, dbus-1-x11-1.8.22-29.24.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): dbus-1-1.8.22-29.24.1, dbus-1-x11-1.8.22-29.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3806-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1087072,1204111,1204112,1204113 CVE References: CVE-2022-42010,CVE-2022-42011,CVE-2022-42012 JIRA References: Sources used: openSUSE Leap 15.4 (src): dbus-1-1.12.2-150400.18.5.1, dbus-1-x11-1.12.2-150400.18.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): dbus-1-1.12.2-150400.18.5.1, dbus-1-x11-1.12.2-150400.18.5.1 SUSE Linux Enterprise Micro 5.3 (src): dbus-1-1.12.2-150400.18.5.1, dbus-1-x11-1.12.2-150400.18.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4295-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1087072,1204111,1204112,1204113 CVE References: CVE-2022-42010,CVE-2022-42011,CVE-2022-42012 JIRA References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP5 (src): dbus-1-1.8.22-38.1, dbus-1-x11-1.8.22-38.1 SUSE Linux Enterprise Server 12-SP5 (src): dbus-1-1.8.22-38.1, dbus-1-x11-1.8.22-38.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Hi Simon, thanks a lot for your work! Our tools still show this as affected in the following codestreams: dbus-1: SUSE:SLE-11-SP1:Update SUSE:SLE-12:Update SUSE:SLE-15:Update Do you know what the status is there? Thanks!
(In reply to Hu from comment #12) > Hi Simon, thanks a lot for your work! > Our tools still show this as affected in the following codestreams: > > dbus-1: > SUSE:SLE-11-SP1:Update > SUSE:SLE-12:Update > SUSE:SLE-15:Update > > Do you know what the status is there? Thanks! As far as i'm aware these are all LTSS streams and the CVSS score doesn't meet the threashold to fix them there, based on the bug being introduced in version 1.3 they are probably all still affected. If I got anything wrong in that assessment please let me know.
Ah, yes you are right, SUSE:SLE-12:Update and SUSE:SLE-15:Update don't need a fix. However, SUSE:SLE-11-SP1:Update is still supported under l3, so it needs to be fixed: https://smelt.suse.de/maintained/?q=dbus-1
(In reply to Hu from comment #14) > Ah, yes you are right, SUSE:SLE-12:Update and SUSE:SLE-15:Update don't need > a fix. > > However, SUSE:SLE-11-SP1:Update is still supported under l3, so it needs to > be fixed: https://smelt.suse.de/maintained/?q=dbus-1 Sorry I could only see SLE-SERVER_11-SP3-TERADATA there and I am under the impression that Teradata only gets the same fixes as LTSS or has that changed?
(In reply to Simon Lees from comment #15) > (In reply to Hu from comment #14) > > Ah, yes you are right, SUSE:SLE-12:Update and SUSE:SLE-15:Update don't need > > a fix. > > > > However, SUSE:SLE-11-SP1:Update is still supported under l3, so it needs to > > be fixed: https://smelt.suse.de/maintained/?q=dbus-1 > > Sorry I could only see SLE-SERVER_11-SP3-TERADATA there and I am under the > impression that Teradata only gets the same fixes as LTSS or has that > changed? Any news for 11-SP3-TD Simon? :)