lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130613124716.GA6434@scapa.corsac.net> Date: Thu, 13 Jun 2013 14:49:21 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: debian-security-announce@...ts.debian.org Subject: [SECURITY] [DSA 2707-1] dbus security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2707-1 security@...ian.org http://www.debian.org/security/ Yves-Alexis Perez June 13, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : dbus Vulnerability : denial of service Problem type : local Debian-specific: no CVE ID : CVE-2013-2168 Alexandru Cornea discovered a vulnerability in libdbus caused by an implementation bug in _dbus_printf_string_upper_bound(). This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service. Depending on the dbus services running, it could lead to complete system crash. The oldstable distribution (squeeze) is not affected by this problem. For the stable distribution (wheezy), this problem has been fixed in version 1.6.8-1+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 1.6.12-1. For the unstable distribution (sid), this problem has been fixed in version 1.6.12-1. We recommend that you upgrade your dbus packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (GNU/Linux) iQEcBAEBCgAGBQJRub9QAAoJEG3bU/KmdcClBZ0H/AyRsjX0rH4O1dARNlgtNC8r VdJyuzlKUzEbVxD7o8PV2EDBVU58h+7cQQUvA8l3qNFEKctcfPmJzGlkfuYaZWQg ZlTH6FUA6fYsTrE7fsUUTig/wct12UMNJm+WLkkqWfjTAgwRJpyvwEg10TzwMUYH pyvT86nGLaRIdxILczrfA8W+jDY8Ned4pj/DsKOY9ky+IkS3p9Mq7L/kAqe91Ynd 1HhAU7+9MbUg3UrSjGF7PF4BijR7/cseUiRd0R6oEdrzxXT9kbb57UCso9LcJh76 y/UfFqyetdJqqdyFqBnASHwCE510WmXwwSqSXWTnBpiEwJy7LjaXiCcZx8Ej1wg= =gnak -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists