Hide Forgot
A heap-based buffer overflow flaw was reported in D-Bus's file descriptor passing. On 64-bit systems, if the max_message_unix_fds limit was set to an odd number, a local, malicious user could send one more file descriptor than expected. This would cause the dbus-daemon to crash or, potentially, execute arbitrary code. It is believed that versions 1.3.0 and later are affected. Acknowledgements: Red Hat would like to thank D-Bus upstream for reporting this issue. Upstream acknowledges Simon McVittie as the original reporter.
Created attachment 936433 [details] initial patch from upstream
Created attachment 936434 [details] silence a compiler warning in the previous patch
Created attachment 936435 [details] regression test
Created dbus tracking bugs for this issue: Affects: fedora-all [bug 1142581]
Created mingw-dbus tracking bugs for this issue: Affects: fedora-all [bug 1142582] Affects: epel-7 [bug 1142583]
Public now: http://www.openwall.com/lists/oss-security/2014/09/16/9
dbus-1.6.28-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
dbus-1.8.12-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
dbus-1.6.28-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.