Bug 1849041 (CVE-2020-12049)

Summary: CVE-2020-12049 dbus: denial of service via file descriptor leak
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: amigadave, caillon+fedoraproject, csvoboda, dking, gnome-sig, gparvin, john.j5live, jramanat, jweiser, lpoetter, mclasen, mmatsuya, rhughes, rstrode, sandmann, stcannon, tfister, tgunders, thee, walters
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: dbus 1.13.16, dbus 1.12.18, dbus 1.10.30 Doc Type: If docs needed, set a value
Doc Text:
An uncontrolled resource consumption vulnerability was discovered in D-Bus. The DBusServer leaks file descriptors when a message exceeds the per-message file descriptor limit. This flaw allows a local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket, to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients. As a result, the system may become unusable for other users, and some services may stop working. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-07-13 13:27:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1849042, 1851991, 1851992, 1851994, 1851995, 1851996, 1851997, 1860089, 1870641, 1870642, 1889758    
Bug Blocks: 1849043    

Description Dhananjay Arunesh 2020-06-19 14:03:40 UTC
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.

References:
http://www.openwall.com/lists/oss-security/2020/06/04/3
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16

Comment 1 Dhananjay Arunesh 2020-06-19 14:04:05 UTC
Created dbus tracking bugs for this issue:

Affects: fedora-all [bug 1849042]

Comment 5 Riccardo Schirone 2020-06-29 15:09:13 UTC
Function _dbus_read_socket_with_unix_fds() does not close the opened file descriptors when the control data of the message was truncated. This leaks some file descriptors. If multiple file descriptor are leaked, the dbus process can reach its RLIMIT_NOFILE limit enforced by the system, thus when later some service tries to use the bus, DBus is not able to operate properly because it cannot allocate more file descriptors. As DBus is nowadays used by multiple services, the system becomes almost unusable.

Comment 7 Riccardo Schirone 2020-06-29 15:28:39 UTC
Statement:

This issue did not affect the versions of dbus as shipped with Red Hat Enterprise Linux 5, and 6 as they did not include the vulnerable code.

Comment 8 errata-xmlrpc 2020-07-13 11:21:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:2894 https://access.redhat.com/errata/RHSA-2020:2894

Comment 9 Product Security DevOps Team 2020-07-13 13:27:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-12049

Comment 11 Chuck Svoboda 2020-07-20 16:28:24 UTC
How is this closed?  RHEL8 is affected and there is no security advisory.

Comment 12 errata-xmlrpc 2020-07-21 11:08:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3014 https://access.redhat.com/errata/RHSA-2020:3014

Comment 13 errata-xmlrpc 2020-07-21 14:33:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:3044 https://access.redhat.com/errata/RHSA-2020:3044

Comment 16 errata-xmlrpc 2020-08-04 07:39:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:3298 https://access.redhat.com/errata/RHSA-2020:3298