A denial of service flaw was reported in D-Bus's file descriptor passing. A local, malicious user could use this flaw to cause a denial of service (prevent new connections to the bus, or disconnect something from the bus) by queuing up a large number of file descriptors to send, or by splitting a message to allow more file descriptors than expected to be sent. It is believed that versions 1.3.0 and later are affected. Acknowledgements: Red Hat would like to thank D-Bus upstream for reporting this issue. Upstream acknowledges Alban Crequy as the original reporter.
Created attachment 936437 [details] initial patch from upstream
Created dbus tracking bugs for this issue: Affects: fedora-all [bug 1142581]
Created mingw-dbus tracking bugs for this issue: Affects: fedora-all [bug 1142582] Affects: epel-7 [bug 1142583]
Public now: http://www.openwall.com/lists/oss-security/2014/09/16/9
Note that the upstream fix for this was incomplete; please see bug #1173555 (CVE-2014-7824) for the additional patches required to fix this flaw.
To properly fix this issue, the following two patches are also required: https://bugzilla.redhat.com/attachment.cgi?id=967618 https://bugzilla.redhat.com/attachment.cgi?id=967617 They are what are included with CVE-2014-7824. However, since we never did provide an update with the faulty patch, we are not vulnerable to that CVE. Given the Low impact of this issue, we do not intend to fix it at this time.
dbus-1.6.28-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
dbus-1.8.12-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
dbus-1.6.28-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.