+dbus 1.15.6 (2023-06-06) +======================== + +Denial-of-service fixes: + +• Fix an assertion failure in dbus-daemon when a privileged Monitoring + connection (dbus-monitor, busctl monitor, gdbus monitor or similar) + is active, and a message from the bus driver cannot be delivered to a + client connection due to <deny> rules or outgoing message quota. This + is a denial of service if triggered maliciously by a local attacker. + (dbus#457; hongjinghao, Simon McVittie)
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=019441ca69cd9026020e0af5b5d4a77e12fcce06 commit 019441ca69cd9026020e0af5b5d4a77e12fcce06 Author: Sam James <sam@gentoo.org> AuthorDate: 2023-06-07 07:58:48 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2023-06-07 08:14:06 +0000 sys-apps/dbus: add 1.15.6 Bug: https://bugs.gentoo.org/907975 Signed-off-by: Sam James <sam@gentoo.org> sys-apps/dbus/Manifest | 1 + sys-apps/dbus/dbus-1.15.6.ebuild | 302 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 303 insertions(+)
CVE-2023-34969 (https://gitlab.freedesktop.org/dbus/dbus/-/issues/457): D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.