MGASA-2014-0395

Source
https://advisories.mageia.org/MGASA-2014-0395.html
Import Source
https://advisories.mageia.org/MGASA-2014-0395.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0395
Related
Published
2014-10-07T09:22:51Z
Modified
2014-10-07T08:59:41Z
Summary
Updated dbus packages fix multiple security vulnerabilities
Details

Updated dbus packages fixes the following security issues:

Alban Crequy and Simon McVittie discovered several vulnerabilities in the D-Bus message daemon:

On 64-bit platforms, file descriptor passing could be abused by local users to cause heap corruption in dbus-daemon, leading to a crash, or potentially to arbitrary code execution (CVE-2014-3635).

A denial-of-service vulnerability in dbus-daemon allowed local attackers to prevent new connections to dbus-daemon, or disconnect existing clients, by exhausting descriptor limits (CVE-2014-3636).

Malicious local users could create D-Bus connections to dbus-daemon which could not be terminated by killing the participating processes, resulting in a denial-of-service vulnerability (CVE-2014-3637).

dbus-daemon suffered from a denial-of-service vulnerability in the code which tracks which messages expect a reply, allowing local attackers to reduce the performance of dbus-daemon (CVE-2014-3638).

dbus-daemon did not properly reject malicious connections from local users, resulting in a denial-of-service vulnerability (CVE-2014-3639).

References
Credits

Affected packages

Mageia:3 / dbus

Package

Name
dbus
Purl
pkg:rpm/mageia/dbus?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.8-4.5.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / dbus

Package

Name
dbus
Purl
pkg:rpm/mageia/dbus?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.18-1.4.mga4

Ecosystem specific

{
    "section": "core"
}