Lucene search

K
debianDebianDEBIAN:DSA-3099-1:DAD5F
HistoryDec 11, 2014 - 9:15 p.m.

[SECURITY] [DSA 3099-1] dbus security update

2014-12-1121:15:23
lists.debian.org
10

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.3%


Debian Security Advisory DSA-3099-1 [email protected]
http://www.debian.org/security/ Florian Weimer
December 11, 2014 http://www.debian.org/security/faq


Package : dbus
CVE ID : CVE-2014-7824

Simon McVittie discovered that the fix for CVE-2014-3636 was
incorrect, as it did not fully address the underlying
denial-of-service vector. This update starts the D-Bus daemon as root
initially, so that it can properly raise its file descriptor count.

In addition, this update reverts the auth_timeout change in the
previous security update to its old value because the new value causes
boot failures on some systems. See the README.Debian file for details
how to harden the D-Bus daemon against malicious local users.

For the stable distribution (wheezy), these problem have been fixed in
version 1.6.8-1+deb7u5.

For the upcoming stable distribution (jessie) and the unstable
distribution (sid), these problem have been fixed in version 1.8.10-1.

We recommend that you upgrade your dbus packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.3%