Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-3707

Опубликовано: 14 нояб. 2019
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2019-3707: dbus security update (MODERATE)

[1.12.8-9.0.1]

  • fix netlink poll: error 4 (Zhenzhong Duan)

[1:1.12.8-9]

  • Ensure that patches are applied (#1725570)

[1:1.12.8-8]

  • Fix CVE-2019-12749 (#1725570)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

dbus

1.12.8-9.0.1.el8

dbus-common

1.12.8-9.0.1.el8

dbus-daemon

1.12.8-9.0.1.el8

dbus-devel

1.12.8-9.0.1.el8

dbus-libs

1.12.8-9.0.1.el8

dbus-tools

1.12.8-9.0.1.el8

dbus-x11

1.12.8-9.0.1.el8

Oracle Linux x86_64

dbus

1.12.8-9.0.1.el8

dbus-common

1.12.8-9.0.1.el8

dbus-daemon

1.12.8-9.0.1.el8

dbus-devel

1.12.8-9.0.1.el8

dbus-libs

1.12.8-9.0.1.el8

dbus-tools

1.12.8-9.0.1.el8

dbus-x11

1.12.8-9.0.1.el8

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7
redhat
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
nvd
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
msrc
больше 5 лет назад

dbus before 1.10.28 1.12.x before 1.12.16 and 1.13.x before 1.13.12 as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some less common uses of dbus-daemon) allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case this could result in the DBusServer reusing a cookie that is known to the malicious client and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid allowing authentication bypass.

CVSS3: 7.1
debian
больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, ...