drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in dbus
Name: |
Denial of Service in dbus |
|
ID: |
DSA-3161-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Do, 12. Februar 2015, 07:27 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245 |
|
Applikationen: |
D-BUS |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3161-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso February 11, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : dbus CVE ID : CVE-2015-0245 Debian Bug : 777545
Simon McVittie discovered a local denial of service flaw in dbus, an asynchronous inter-process communication system. On systems with systemd-style service activation, dbus-daemon does not prevent forged ActivationFailure messages from non-root processes. A malicious local user could use this flaw to trick dbus-daemon into thinking that systemd failed to activate a system service, resulting in an error reply back to the requester.
For the stable distribution (wheezy), this problem has been fixed in version 1.6.8-1+deb7u6.
For the unstable distribution (sid), this problem has been fixed in version 1.8.16-1.
We recommend that you upgrade your dbus packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJU272UAAoJEAVMuPMTQ89ElXgP+gJinMU0W3DoCMhoVe+fls7S vT0AyVlUdJUgF7vyGDWzDGbwpcxDpLcQYWql8jDRiANhVdMczMNmJr0UKyI+ZqCV pV3QxAgjb8TEesfcEXvcnfgQ4NmlsRO2Dv6hltZBHKWRVyMFZAdccmCTBQ8G00PM Ob3eHkLI4NN4asvpt69bXx7BzD+LPMP4gbAJ0emUs6gW3A9U3DbGSkf40Z94TVGZ Rd0Gyzc2adFWTRu1/752hmi9E2Rk3vLNwRoWmYgrP8I8cQSm0mO+dw6vQQcQP+T3 9jE6DWqKgDvs2cdVmTcMOyFjB08b574ttDG0HTy82pawK39DEqWWBomexRvcgBxk p/zln4ywSeI2aqSCg8+tM36MAns5R3a5x46LqDQxyfb/sikUwjRPLxjAwffCXEv7 ex0uxvaTMuU5vMsPShA490Y3N3f/Zmz49IvG4G0lxWDEeCmAFbK9R0YzRoK/1+99 3NvYIEvR/xrDK3AXsWZ/uBdEl4o8Cuh0iSf+sx7XWqr2u0+Qv310LeZlPD9nkAmv 0nza/JrBvu0ndKQSWrNh8qDwbJProuEGaocuXcbTcvGgDr3PpLLDSuEZ0T76ChVA ScungAUHjx3apOM8DxaCJ24mURG434PReRbm5rL8EiX+VRgDjDxklZs33YXVd2uE LoVa+pdekEVP7/EE8HEO =5spH -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1YLe3t-0006U7-JN@master.debian.org
|
|
|
|