Debian: DSA-3099-1: dbus security update

    Date11 Dec 2014
    CategoryDebian
    37
    Posted ByLinuxSecurity Advisories
    Simon McVittie discovered that the fix for CVE-2014-3636 was incorrect, as it did not fully address the underlying denial-of-service vector. This update starts the D-Bus daemon as root initially, so that it can properly raise its file descriptor count.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3099-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                            Florian Weimer
    December 11, 2014                      http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : dbus
    CVE ID         : CVE-2014-7824
    
    Simon McVittie discovered that the fix for CVE-2014-3636 was
    incorrect, as it did not fully address the underlying
    denial-of-service vector.  This update starts the D-Bus daemon as root
    initially, so that it can properly raise its file descriptor count.
    
    In addition, this update reverts the auth_timeout change in the
    previous security update to its old value because the new value causes
    boot failures on some systems.  See the README.Debian file for details
    how to harden the D-Bus daemon against malicious local users.
    
    For the stable distribution (wheezy), these problem have been fixed in
    version 1.6.8-1+deb7u5.
    
    For the upcoming stable distribution (jessie) and the unstable
    distribution (sid), these problem have been fixed in version 1.8.10-1.
    
    We recommend that you upgrade your dbus packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.