Login
Newsletter
Werbung

Sicherheit: Denial of Service in dbus
Aktuelle Meldungen Distributionen
Name: Denial of Service in dbus
ID: DSA-3161-1
Distribution: Debian
Plattformen: Debian sid, Debian wheezy
Datum: Do, 12. Februar 2015, 07:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
Applikationen: D-BUS

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3161-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
February 11, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : dbus
CVE ID : CVE-2015-0245
Debian Bug : 777545

Simon McVittie discovered a local denial of service flaw in dbus, an
asynchronous inter-process communication system. On systems with
systemd-style service activation, dbus-daemon does not prevent forged
ActivationFailure messages from non-root processes. A malicious local
user could use this flaw to trick dbus-daemon into thinking that systemd
failed to activate a system service, resulting in an error reply back to
the requester.

For the stable distribution (wheezy), this problem has been fixed in
version 1.6.8-1+deb7u6.

For the unstable distribution (sid), this problem has been fixed in
version 1.8.16-1.

We recommend that you upgrade your dbus packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=5spH
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Archive: https://lists.debian.org/E1YLe3t-0006U7-JN@master.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung