Bug 916343 (CVE-2015-0245) - VUL-0: CVE-2015-0245: dbus-1: denial of service in dbus >= 1.4 systemd activation
Summary: VUL-0: CVE-2015-0245: dbus-1: denial of service in dbus >= 1.4 systemd activa...
Status: RESOLVED FIXED
Alias: CVE-2015-0245
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-02-05 08:17 UTC by Johannes Segitz
Modified: 2016-04-27 21:05 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Proposed code changes (1.93 KB, patch)
2015-02-06 16:13 UTC, Johannes Segitz
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2015-02-05 08:17:02 UTC
Created attachment 621964 [details]
Proposed patch

Date: Tue, 27 Jan 2015 15:47:31 +0000
From: Simon McVittie <simon.mcvittie@collabora.co.uk>

Tracked as: https://bugs.freedesktop.org/show_bug.cgi?id=88811
Versions affected: dbus >= 1.4.0
Type of vulnerability: CWE-285 Improper Authorization
Exploitable by: local users
Impact: denial of service
Reporter: Simon McVittie, Collabora Ltd.

D-Bus <http://www.freedesktop.org/wiki/Software/dbus/> is an
asynchronous inter-process communication system, commonly used
for system services or within a desktop session on Linux and other
operating systems.

dbus-daemon can "activate" (auto-start) D-Bus services on-demand when it
receives a message addressed to them. In versions >= 1.4.0 of dbus, it
can do this by using a D-Bus signal to ask systemd to carry out the
actual service start.

systemd sends back an ActivationFailure D-Bus signal if the activation
fails. However, when it receives these signals, dbus-daemon does not
verify that the signal actually came from systemd. A malicious local
user could send repeated ActivationFailure signals in the hope that it
would "win the race" with the genuine signal, causing D-Bus to send back
an error to the client that requested activation.

Mitigation: the system service is not actually prevented from starting
or claiming its well-known bus name, and after it has done so,
subsequent clients can communicate with it as usual.
Comment 6 Johannes Segitz 2015-02-06 16:13:52 UTC
Created attachment 622249 [details]
Proposed code changes
Comment 7 Bernhard Wiedemann 2015-02-09 20:00:23 UTC
This is an autogenerated message for OBS integration:
This bug (916343) was mentioned in
https://build.opensuse.org/request/show/284951 13.2 / dbus-1-x11+dbus-1
https://build.opensuse.org/request/show/284952 13.1 / dbus-1-x11+dbus-1
https://build.opensuse.org/request/show/284953 Factory / dbus-1
Comment 10 Swamp Workflow Management 2015-02-17 12:04:54 UTC
openSUSE-SU-2015:0300-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 916343
CVE References: CVE-2015-0245
Sources used:
openSUSE 13.2 (src):    dbus-1-1.8.16-16.1, dbus-1-x11-1.8.16-16.1
openSUSE 13.1 (src):    dbus-1-1.8.16-4.36.1, dbus-1-x11-1.8.16-4.36.2
Comment 11 Swamp Workflow Management 2015-03-10 14:10:05 UTC
SUSE-SU-2015:0457-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 916343,916785
CVE References: CVE-2015-0245
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    dbus-1-1.8.16-14.1, dbus-1-x11-1.8.16-14.1
SUSE Linux Enterprise Server 12 (src):    dbus-1-1.8.16-14.1, dbus-1-x11-1.8.16-14.1
SUSE Linux Enterprise Desktop 12 (src):    dbus-1-1.8.16-14.1, dbus-1-x11-1.8.16-14.1
Comment 12 Andreas Stieger 2015-10-23 13:57:29 UTC
All fixed for this one, closing.