Bug 55272 - dbus: Multiple issues (5.0)
dbus: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-10-17 09:01 CEST by Quality Assurance
Modified: 2022-10-20 13:41 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2022-10-17 09:01:28 CEST
New Debian dbus 1.12.24-0+deb10u1 fixes:
This update addresses the following issues:
* An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before  1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause  dbus-daemon and other programs that use libdbus to crash when receiving a  message with certain invalid type signatures. (CVE-2022-42010)
* An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before  1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause  dbus-daemon and other programs that use libdbus to crash when receiving a  message where an array length is inconsistent with the size of the element  type. (CVE-2022-42011)
* An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before  1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause  dbus-daemon and other programs that use libdbus to crash by sending a  message with attached file descriptors in an unexpected format.  (CVE-2022-42012)
Comment 1 Quality Assurance univentionstaff 2022-10-17 10:00:12 CEST
--- mirror/ftp/pool/main/d/dbus/dbus_1.12.20-0+deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-2/source/dbus_1.12.24-0+deb10u1.dsc
@@ -1,3 +1,14 @@
+1.12.24-0+deb10u1 [Mon, 10 Oct 2022 13:19:03 +0200] Emilio Pozuelo Monfort <pochu@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * New upstream stable release. Notable changes:
+    - Fix several denial of service issues where an authenticated attacker
+      can crash the system bus by sending crafted messages
+      (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012)
+    - Use a path-based Unix socket for the session bus, avoiding sandbox
+      escape for Flatpak apps with network access (dbus#416)
+    - Don't crash if asked to watch more than 128 directories for changes
+
 1.12.20-0+deb10u1 [Sun, 05 Jul 2020 17:10:45 +0100] Simon McVittie <smcv@debian.org>:
 
   * New upstream stable release

<http://piuparts.knut.univention.de/5.0-2/#8990607768901602024>
Comment 2 Philipp Hahn univentionstaff 2022-10-18 07:36:59 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-2] 374142e8a6 Bug #55272: dbus 1.12.24-0+deb10u1
 doc/errata/staging/dbus.yaml | 23 +++++++++--------------
 1 file changed, 9 insertions(+), 14 deletions(-)

[5.0-2] b9f303c65a Bug #55272: dbus 1.12.24-0+deb10u1
 doc/errata/staging/dbus.yaml | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)