Package: dbus
Severity: serious
Justification: local privilege escalation
Tags: security

Hi,

CVE-2012-3524 is about setuid binaries linking libdbus being easily trickable to do bad things via a malicious PATH (for finding dbus-launch), or through a DBUS_* address variable using the unixexec address type. Initially the D-Bus developers thought that this should be fixed on the application side (hence the comment in the security-tracker), but decided that it would be better to have a defense-in-depth approach, and change _dbus_getenv to not succeed if the current program is setuid or similar, since that's faster than patching every relevant program.

There's a patch in the D-Bus 1.6.6 release that implements this. Many other distros, including RHEL/Fedora, SUSE, and Ubuntu have taken this patch already. There are some other hardening things in the 1.6.6 release that broke gnome-keyring, prompting a 1.6.8 release a few hours later to revert those; you should either take 1.6.8, or just backport the four patches that weren't reverted in 1.6.8:

http://cgit.freedesktop.org/dbus/dbus/commit/?id=23fe78ceefb6cefcd58a49c77d1154b68478c8d2
http://cgit.freedesktop.org/dbus/dbus/commit/?id=4b351918b9f70eaedbdb3ab39208bc1f131efae0
http://cgit.freedesktop.org/dbus/dbus/commit/?id=57ae3670508bbf4ec57049de47c9cae727a64802
http://cgit.freedesktop.org/dbus/dbus/commit/?id=f68dbdc3e6f895012ce33939fb524accf31bcca5

I think these are all easily backportable, but I'm happy to supply a debdiff if that'd make it easier for you.

More discussion of the issue can be found at

https://bugs.freedesktop.org/show_bug.cgi?id=52202
https://bugzilla.novell.com/show_bug.cgi?id=697105
https://bugzilla.redhat.com/show_bug.cgi?id=847402
http://seclists.org/oss-sec/2012/q3/29

--
Geoffrey Thomas
gtho...@mokafive.com


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to