Bug 464674 - (CVE-2008-3834) CVE-2008-3834 dbus denial of service
CVE-2008-3834 dbus denial of service
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 465835 465836 466224 466225 466226 466227
  Show dependency treegraph
Reported: 2008-09-29 17:02 EDT by Colin Walters
Modified: 2010-12-23 17:34 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-12-23 17:34:00 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Patch applied to upstream dbus (98 bytes, text/plain)
2008-10-09 04:51 EDT, Jan Lieskovsky
no flags Details

External Trackers
Tracker ID Priority Status Summary Last Updated
FreeDesktop.org 17803 None None None Never
Red Hat Product Errata RHSA-2009:0008 normal SHIPPED_LIVE Moderate: dbus security update 2009-01-07 08:30:44 EST

  None (edit)
Description Colin Walters 2008-09-29 17:02:13 EDT
Upstream bug report:


It is likely possible to send a message with a malformed signature which would cause the bus (or in general any process using libdbus to receive messages) to abort.
Comment 1 Josh Bressers 2008-09-30 09:48:11 EDT
Do you know what versions of dbus are affected by this?
Comment 2 Colin Walters 2008-10-01 17:02:41 EDT
This code dates at least as far back as:

commit 5e389fdf499c39926c61b47fcafb5e71291ce1a2
Author: John (J5) Palmieri <johnp@redhat.com>
Date:   Wed Jun 15 15:15:32 2005 +0000
Comment 3 Colin Walters 2008-10-01 17:41:40 EDT
According to brew the first build of dbus in RHEL is 2006, so I think this affects both EL4 and EL5.  Does not affect EL3 or earlier as I don't believe DBus is shipped there.
Comment 4 Colin Walters 2008-10-01 17:43:20 EDT
By the way I could use some hand-holding with respect to how this should be handled upstream, things like if/how I allocate a CVE, etc.

Note the bug was filed publicly so we can't embargo or anything like that.
Comment 5 Colin Walters 2008-10-03 17:51:44 EDT
Ping on this - I'd like to do a new upstream release with the fix and could use advice on how to do the announcement and CVE etc.
Comment 6 Josh Bressers 2008-10-03 21:23:48 EDT
Sorry, I let this one slip through the cracks.  We'll deal with it next week.
Comment 7 Josh Bressers 2008-10-06 12:42:48 EDT
I've assigned CVE-2008-3834 to this, and I'm moving this bug to the security-response product.
Comment 9 Fedora Update System 2008-10-07 14:27:07 EDT
dbus-1.2.4-1.fc9 has been submitted as an update for Fedora 9.
Comment 10 Jan Lieskovsky 2008-10-09 04:51:41 EDT
Created attachment 319837 [details]
Patch applied to upstream dbus
Comment 14 Fedora Update System 2008-10-09 17:34:52 EDT
dbus-1.2.4-1.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 16 Tomas Hoger 2008-10-27 09:57:47 EDT
Direct link to upstream patch, as the attachment in comment #10 only contains URL of the upstream commit:

Comment 17 Tomas Hoger 2008-10-30 04:47:08 EDT
This issue was fixed upstream in 1.2.4.
Comment 18 Vincent Danen 2010-12-23 17:34:00 EST
This was addressed via:

Red Hat Enterprise Linux version 5 (RHSA-2009:0008)

Note You need to log in before you can comment on or make changes to this bug.