Описание
ELSA-2013-0568: dbus-glib security update (IMPORTANT)
[0.73-11]
- Add patch to fix CVE-2013-0292
- Resolves: #913072
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
dbus-glib
0.73-11.el5_9
dbus-glib-devel
0.73-11.el5_9
Oracle Linux x86_64
dbus-glib
0.73-11.el5_9
dbus-glib-devel
0.73-11.el5_9
Oracle Linux i386
dbus-glib
0.73-11.el5_9
dbus-glib-devel
0.73-11.el5_9
Oracle Linux 6
Oracle Linux x86_64
dbus-glib
0.86-6.el6_4
dbus-glib-devel
0.86-6.el6_4
Oracle Linux i686
dbus-glib
0.86-6.el6_4
dbus-glib-devel
0.86-6.el6_4
Oracle Linux sparc64
dbus-glib
0.86-6.el6_4
dbus-glib-devel
0.86-6.el6_4
Связанные CVE
Связанные уязвимости
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib b ...
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.