Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-1726

Опубликовано: 10 июл. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-1726: dbus security update (IMPORTANT)

[1:1.2.24-11.0.1]

  • fix netlink poll: error 4 (Zhenzhong Duan)

[1:1.2.24-11]

  • Apply patch for CVE-2019-12749 (#1725574)

[1:1.2.24-10]

  • Fix CVE-2019-12749 (#1725574)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dbus

1.2.24-11.0.1.el6_10

dbus-devel

1.2.24-11.0.1.el6_10

dbus-doc

1.2.24-11.0.1.el6_10

dbus-libs

1.2.24-11.0.1.el6_10

dbus-x11

1.2.24-11.0.1.el6_10

Oracle Linux i686

dbus

1.2.24-11.0.1.el6_10

dbus-devel

1.2.24-11.0.1.el6_10

dbus-doc

1.2.24-11.0.1.el6_10

dbus-libs

1.2.24-11.0.1.el6_10

dbus-x11

1.2.24-11.0.1.el6_10

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7
redhat
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
nvd
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
msrc
больше 5 лет назад

dbus before 1.10.28 1.12.x before 1.12.16 and 1.13.x before 1.13.12 as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some less common uses of dbus-daemon) allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case this could result in the DBusServer reusing a cookie that is known to the malicious client and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid allowing authentication bypass.

CVSS3: 7.1
debian
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, ...