Bug 1140523 - (CVE-2014-3635) CVE-2014-3635 dbus: heap-based buffer overflow flaw in file descriptor passing
CVE-2014-3635 dbus: heap-based buffer overflow flaw in file descriptor passing
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140916,repor...
: Security
Depends On: 1142581 1142582 1142583
Blocks: 1140534
  Show dependency treegraph
 
Reported: 2014-09-11 03:52 EDT by Murray McAllister
Modified: 2015-01-05 03:31 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-12-12 18:53:44 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
initial patch from upstream (4.24 KB, patch)
2014-09-11 04:28 EDT, Murray McAllister
no flags Details | Diff
silence a compiler warning in the previous patch (1.62 KB, patch)
2014-09-11 04:30 EDT, Murray McAllister
no flags Details | Diff
regression test (28.93 KB, patch)
2014-09-11 04:32 EDT, Murray McAllister
no flags Details | Diff

  None (edit)
Description Murray McAllister 2014-09-11 03:52:03 EDT
A heap-based buffer overflow flaw was reported in D-Bus's file descriptor passing. On 64-bit systems, if the max_message_unix_fds limit was set to an odd number, a local, malicious user could send one more file descriptor than expected. This would cause the dbus-daemon to crash or, potentially, execute arbitrary code.

It is believed that versions 1.3.0 and later are affected.

Acknowledgements:

Red Hat would like to thank D-Bus upstream for reporting this issue. Upstream acknowledges Simon McVittie as the original reporter.
Comment 2 Murray McAllister 2014-09-11 04:28:04 EDT
Created attachment 936433 [details]
initial patch from upstream
Comment 3 Murray McAllister 2014-09-11 04:30:22 EDT
Created attachment 936434 [details]
silence a compiler warning in the previous patch
Comment 4 Murray McAllister 2014-09-11 04:32:18 EDT
Created attachment 936435 [details]
regression test
Comment 5 Murray McAllister 2014-09-17 01:10:44 EDT
Created dbus tracking bugs for this issue:

Affects: fedora-all [bug 1142581]
Comment 6 Murray McAllister 2014-09-17 01:10:47 EDT
Created mingw-dbus tracking bugs for this issue:

Affects: fedora-all [bug 1142582]
Affects: epel-7 [bug 1142583]
Comment 7 Murray McAllister 2014-09-17 01:16:33 EDT
Public now:

http://www.openwall.com/lists/oss-security/2014/09/16/9
Comment 8 Fedora Update System 2014-12-13 04:47:43 EST
dbus-1.6.28-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2014-12-16 23:46:47 EST
dbus-1.8.12-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2014-12-19 13:26:31 EST
dbus-1.6.28-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.