- Issued:
- 2016-08-08
- Updated:
- 2016-08-08
RHBA-2016:1577 - Bug Fix Advisory
Synopsis
dbus bugfix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dbus packages that fix one bug are now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Description
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
This update fixes the following bug:
- Previously, the dbus-daemon service incorrectly handled multiple messages containing file descriptors if they were received in a short time period. As a consequence, dbus-daemon leaked file descriptors and became unresponsive. A patch has been applied to correctly handle multiple file descriptors from different messages inside dbus-daemon. As a result, dbus-daemon closes and passes file descriptors correctly and no longer becomes unresponsive in the described situation. (BZ#1360164)
Users of dbus are advised to upgrade to these updated packages, which fix this bug. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
- Red Hat Enterprise Linux Server - TUS 6.5 x86_64
Fixes
(none)CVEs
(none)
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
dbus-1.2.24-8.el6_5.src.rpm | SHA-256: e10c756802316a0a0592da9177bc53e0ea3f33d611e74dd3b3d8e4bfcb147c1b |
x86_64 | |
dbus-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 7b4d222ea43864b7bfb66926567632b3832dd0bd3e9f3698af8aad1ebc7fd45f |
dbus-debuginfo-1.2.24-8.el6_5.i686.rpm | SHA-256: 066985eba7e498a33ef8c5f2b276b6187a9ae4d17abe6fcc0268f274bd84adb3 |
dbus-debuginfo-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 95871ed078bf9b2d8a91b8c57cf0a29f2d6ded13f1c3539ef8522c03948a89a6 |
dbus-devel-1.2.24-8.el6_5.i686.rpm | SHA-256: d42eea051cc6d41bce5ee1e3d84c4e628b569f0c538c2e05698a435ee8523b3b |
dbus-devel-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 54e6b65f7fbe755793737d832aa7cba47ee428187e83190c8b5fb50d7795dc52 |
dbus-doc-1.2.24-8.el6_5.noarch.rpm | SHA-256: 985fc75acc1552cdea013504c310bf4dc2c29ab02c5c20a3d864e5947982e473 |
dbus-libs-1.2.24-8.el6_5.i686.rpm | SHA-256: 829444724ba420137b86669dd95cddd0b053bf05a0466e5eb417271562d64a60 |
dbus-libs-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 1837ed106f8efa1fe432faa72806a04cc156cba05c74a2085593a27fe8196ca4 |
dbus-x11-1.2.24-8.el6_5.x86_64.rpm | SHA-256: dcaf15b2d022343a9bac36f99ccba16608ca56343f0ebf6ebcefa58e87c0479c |
Red Hat Enterprise Linux Server - TUS 6.5
SRPM | |
---|---|
dbus-1.2.24-8.el6_5.src.rpm | SHA-256: e10c756802316a0a0592da9177bc53e0ea3f33d611e74dd3b3d8e4bfcb147c1b |
x86_64 | |
dbus-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 7b4d222ea43864b7bfb66926567632b3832dd0bd3e9f3698af8aad1ebc7fd45f |
dbus-debuginfo-1.2.24-8.el6_5.i686.rpm | SHA-256: 066985eba7e498a33ef8c5f2b276b6187a9ae4d17abe6fcc0268f274bd84adb3 |
dbus-debuginfo-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 95871ed078bf9b2d8a91b8c57cf0a29f2d6ded13f1c3539ef8522c03948a89a6 |
dbus-devel-1.2.24-8.el6_5.i686.rpm | SHA-256: d42eea051cc6d41bce5ee1e3d84c4e628b569f0c538c2e05698a435ee8523b3b |
dbus-devel-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 54e6b65f7fbe755793737d832aa7cba47ee428187e83190c8b5fb50d7795dc52 |
dbus-doc-1.2.24-8.el6_5.noarch.rpm | SHA-256: 985fc75acc1552cdea013504c310bf4dc2c29ab02c5c20a3d864e5947982e473 |
dbus-libs-1.2.24-8.el6_5.i686.rpm | SHA-256: 829444724ba420137b86669dd95cddd0b053bf05a0466e5eb417271562d64a60 |
dbus-libs-1.2.24-8.el6_5.x86_64.rpm | SHA-256: 1837ed106f8efa1fe432faa72806a04cc156cba05c74a2085593a27fe8196ca4 |
dbus-x11-1.2.24-8.el6_5.x86_64.rpm | SHA-256: dcaf15b2d022343a9bac36f99ccba16608ca56343f0ebf6ebcefa58e87c0479c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.