dbus-glib is vulnerable to access control bypass. It was discovered that dbus-glib did not enforce the “access” flag on exported GObject properties. If such a property were read/write internally but specified as read-only externally, a malicious, local user could use this flaw to modify that property of an application. Such a change could impact the application’s behavior (for example, if an IP address were changed the network may not come up properly after reboot) and possibly lead to a denial of service.
cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
secunia.com/advisories/40908
secunia.com/advisories/40925
secunia.com/advisories/42397
support.avaya.com/css/P8/documents/100113103
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0616.html
www.securityfocus.com/bid/42347
www.vupen.com/english/advisories/2010/2063
www.vupen.com/english/advisories/2010/3097
access.redhat.com/errata/RHSA-2010:0616
bugzilla.redhat.com/show_bug.cgi?id=585394
exchange.xforce.ibmcloud.com/vulnerabilities/61041