==================================================================== Red Hat Security Advisory Synopsis: Moderate: dbus security update Advisory ID: RHSA-2009:0008-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0008.html Issue date: 2009-01-07 CVE Names: CVE-2008-3834 ==================================================================== 1. Summary: Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at 5. Bugs fixed (https://bugzilla.redhat.com/): 464674 - CVE-2008-3834 dbus denial of service 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: i386: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-x11-1.0.0-7.el5_2.1.i386.rpm x86_64: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-1.0.0-7.el5_2.1.x86_64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-x11-1.0.0-7.el5_2.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: i386: dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm x86_64: dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: i386: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-x11-1.0.0-7.el5_2.1.i386.rpm ia64: dbus-1.0.0-7.el5_2.1.ia64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ia64.rpm dbus-devel-1.0.0-7.el5_2.1.ia64.rpm dbus-x11-1.0.0-7.el5_2.1.ia64.rpm ppc: dbus-1.0.0-7.el5_2.1.ppc.rpm dbus-1.0.0-7.el5_2.1.ppc64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ppc.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ppc64.rpm dbus-devel-1.0.0-7.el5_2.1.ppc.rpm dbus-devel-1.0.0-7.el5_2.1.ppc64.rpm dbus-x11-1.0.0-7.el5_2.1.ppc.rpm s390x: dbus-1.0.0-7.el5_2.1.s390.rpm dbus-1.0.0-7.el5_2.1.s390x.rpm dbus-debuginfo-1.0.0-7.el5_2.1.s390.rpm dbus-debuginfo-1.0.0-7.el5_2.1.s390x.rpm dbus-devel-1.0.0-7.el5_2.1.s390.rpm dbus-devel-1.0.0-7.el5_2.1.s390x.rpm dbus-x11-1.0.0-7.el5_2.1.s390x.rpm x86_64: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-1.0.0-7.el5_2.1.x86_64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.x86_64.rpm dbus-x11-1.0.0-7.el5_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834 https://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc.