Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3161-1] dbus security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3161-1] dbus security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3161-1] dbus security update
  • Date: Wed, 11 Feb 2015 20:39:05 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Wed, 11 Feb 2015 20:39:23 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <dyU7rrkQugK.A.llF.7372UB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3161-1 security AT debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
February 11, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : dbus
CVE ID : CVE-2015-0245
Debian Bug : 777545

Simon McVittie discovered a local denial of service flaw in dbus, an
asynchronous inter-process communication system. On systems with
systemd-style service activation, dbus-daemon does not prevent forged
ActivationFailure messages from non-root processes. A malicious local
user could use this flaw to trick dbus-daemon into thinking that systemd
failed to activate a system service, resulting in an error reply back to
the requester.

For the stable distribution (wheezy), this problem has been fixed in
version 1.6.8-1+deb7u6.

For the unstable distribution (sid), this problem has been fixed in
version 1.8.16-1.

We recommend that you upgrade your dbus packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJU272UAAoJEAVMuPMTQ89ElXgP+gJinMU0W3DoCMhoVe+fls7S
vT0AyVlUdJUgF7vyGDWzDGbwpcxDpLcQYWql8jDRiANhVdMczMNmJr0UKyI+ZqCV
pV3QxAgjb8TEesfcEXvcnfgQ4NmlsRO2Dv6hltZBHKWRVyMFZAdccmCTBQ8G00PM
Ob3eHkLI4NN4asvpt69bXx7BzD+LPMP4gbAJ0emUs6gW3A9U3DbGSkf40Z94TVGZ
Rd0Gyzc2adFWTRu1/752hmi9E2Rk3vLNwRoWmYgrP8I8cQSm0mO+dw6vQQcQP+T3
9jE6DWqKgDvs2cdVmTcMOyFjB08b574ttDG0HTy82pawK39DEqWWBomexRvcgBxk
p/zln4ywSeI2aqSCg8+tM36MAns5R3a5x46LqDQxyfb/sikUwjRPLxjAwffCXEv7
ex0uxvaTMuU5vMsPShA490Y3N3f/Zmz49IvG4G0lxWDEeCmAFbK9R0YzRoK/1+99
3NvYIEvR/xrDK3AXsWZ/uBdEl4o8Cuh0iSf+sx7XWqr2u0+Qv310LeZlPD9nkAmv
0nza/JrBvu0ndKQSWrNh8qDwbJProuEGaocuXcbTcvGgDr3PpLLDSuEZ0T76ChVA
ScungAUHjx3apOM8DxaCJ24mURG434PReRbm5rL8EiX+VRgDjDxklZs33YXVd2uE
LoVa+pdekEVP7/EE8HEO
=5spH
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: E1YLe3t-0006U7-JN AT master.debian.org">https://lists.debian.org/E1YLe3t-0006U7-JN AT master.debian.org




  • [IT-SecNots] [SECURITY] [DSA 3161-1] dbus security update, Salvatore Bonaccorso, 11.02.2015

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang