#3993 closed enhancement (fixed)
dbus-1.10.12 (CVE-2015-0245)
Reported by: | Owned by: | Douglas R. Reno | |
---|---|---|---|
Priority: | high | Milestone: | 8.0 |
Component: | Book | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description (last modified by )
New point version.
Security fixes: • Do not treat ActivationFailure message received from root-owned systemd name as a format string. In principle this is a security vulnerability, but we do not believe it is exploitable in practice, because only privileged processes can own the org.freedesktop.systemd1 bus name, and systemd does not appear to send activation failures that contain "%". Please note that this probably *was* exploitable in dbus versions older than 1.6.30, 1.8.16 and 1.9.10 due to a missing check which at the time was only thought to be a denial of service vulnerability (CVE-2015-0245). If you are still running one of those versions, patch or upgrade immediately. (fd.o #98157, Simon McVittie)
Change History (5)
comment:1 by , 8 years ago
Description: | modified (diff) |
---|---|
Priority: | normal → high |
Type: | task → enhancement |
comment:2 by , 8 years ago
Summary: | dbus-1.10.12 → dbus-1.10.12 (CVE-2015-0245) |
---|
Added the CVE number to the title to aid in my research.
comment:3 by , 8 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
Will update this while building my workstation.
Note:
See TracTickets
for help on using tickets.
It has come to my attention through the BLFS ticket #8424 that there is a security flaw in the versions before.