Bug 432419 (CVE-2008-0595)
Summary: | CVE-2008-0595 dbus security policy circumvention | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Josh Bressers <bressers> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | |||||
Severity: | high | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | davidz, johnp, kreilly, mclasen, rstrode, security-response-team | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | 1.0.2-7.fc7 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2008-02-28 21:36:14 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 432435, 432436, 432437, 432438 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Josh Bressers
2008-02-11 22:08:22 UTC
Created attachment 294608 [details]
Proposed patch
This doesn't affect rhel4 after all. I rewrote the testcase in C using the dbus 0.22 api and I get a lovely assertion blown: [Calling DoPowerfulThing without interface...18538: assertion failed "(interface && member) || (error_name) || !(interface || member || error_name)" file "dbus-message.c" line 1060 The first clause of the assertion says that method calls need to be fully qualified. This is now public: http://lists.freedesktop.org/archives/dbus/2008-February/009401.html dbus-1.0.2-7.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report. dbus-1.1.2-9.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. |