Debian LTS: DLA-3142-1: dbus security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3142-1                [email protected]
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
October 10, 2022                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : dbus
Version        : 1.12.24-0+deb10u1
CVE ID         : CVE-2022-42010 CVE-2022-42011 CVE-2022-42012

Evgeny Vereshchagin discovered multiple vulnerabilities in D-Bus, a
simple interprocess messaging system, which may result in denial of
service by an authenticated user.

For Debian 10 buster, these problems have been fixed in version
1.12.24-0+deb10u1.

We recommend that you upgrade your dbus packages.

For the detailed security status of dbus please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dbus

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3142-1: dbus security update

October 10, 2022
Evgeny Vereshchagin discovered multiple vulnerabilities in D-Bus, a simple interprocess messaging system, which may result in denial of service by an authenticated user

Summary

For Debian 10 buster, these problems have been fixed in version
1.12.24-0+deb10u1.

We recommend that you upgrade your dbus packages.

For the detailed security status of dbus please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dbus

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Severity
Package : dbus
Version : 1.12.24-0+deb10u1
CVE ID : CVE-2022-42010 CVE-2022-42011 CVE-2022-42012

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.