An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/06/04/3 | Mailing List Patch Third Party Advisory |
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 | Exploit Third Party Advisory |
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30 | Third Party Advisory |
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18 | Third Party Advisory |
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16 | Third Party Advisory |
https://usn.ubuntu.com/4398-1/ | Third Party Advisory |
https://usn.ubuntu.com/4398-2/ | Third Party Advisory |
https://security.gentoo.org/glsa/202007-46 | Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-06-08 10:15
Updated : 2021-03-04 13:17
NVD link : CVE-2020-12049
Mitre link : CVE-2020-12049
JSON object : View
CWE
CWE-404
Improper Resource Shutdown or Release
Products Affected
freedesktop
- dbus
canonical
- ubuntu_linux