Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 250546 (CVE-2008-4311) - <sys-apps/dbus-1.2.6 incorrect default policy (CVE-2008-4311)
Summary: <sys-apps/dbus-1.2.6 incorrect default policy (CVE-2008-4311)
Status: RESOLVED FIXED
Alias: CVE-2008-4311
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://lists.freedesktop.org/archives...
Whiteboard: A4? [noglsa]
Keywords:
Depends on: 250444
Blocks:
  Show dependency tree
 
Reported: 2008-12-10 20:34 UTC by Stefan Behte (RETIRED)
Modified: 2011-10-08 21:58 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2008-12-10 20:34:10 UTC
CVE-2008-4311 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4311):
  The default configuration of system.conf in D-Bus (aka DBus) before
  1.2.6 omits the send_type attribute in certain rules, which allows
  local users to bypass intended access restrictions by (1) sending
  messages, related to send_requested_reply; and possibly (2) receiving
  messages, related to receive_requested_reply.
Comment 1 Doug Goldstein (RETIRED) gentoo-dev 2008-12-10 21:42:52 UTC
This was already being tracked in bug #250444. The security impact on Gentoo systems is minimal at this time due to differences in how Fedora and Gentoo do things.
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2008-12-10 21:53:41 UTC

*** This bug has been marked as a duplicate of bug 250444 ***
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-12-11 10:43:59 UTC
We have less system services with dbus interfaces than fedora, but we do not have none, and people might rely on dbus access restrictions for third-party applications, which would still fall under the scope of our security policy.

So I'm reopening this bug for security to track, and the version bump and incompatibility tracker is bug 250444 then.
Comment 4 Doug Goldstein (RETIRED) gentoo-dev 2008-12-11 16:25:38 UTC
(In reply to comment #3)
> We have less system services with dbus interfaces than fedora, but we do not
> have none, and people might rely on dbus access restrictions for third-party
> applications, which would still fall under the scope of our security policy.
> 

Not disagreeing with you wrt to 3rd party apps. However, we can ONLY be responsible for what Gentoo ships. There's no way I can guarantee 3rd party apps to be secure. snprintf() can still be used insecurely and we can't be held responsible. The fact that apps don't include PROPER D-Bus configuration files and rely on the default rule is a security flaw in those apps and NOT D-Bus. The issue is about the default rule being too permissive and people relying on that permissiveness and assuming they don't need to setup a proper config.

The issue with the apps that are affected are apps that rely on the default permissive rule, so I would say the real security issue in Gentoo is with those apps and not the default rule.
Comment 5 Steev Klimaszewski (RETIRED) gentoo-dev 2008-12-15 16:03:36 UTC
New upstream mail...

This issue turned out to be quite a lot more wide ranging than I'd
initially thought.  It didn't help of course inadvertently pushing
what should have been a testing update into Fedora stable.

Anyways, I think we're going to effectively have a flag day.  Some
things were relatively easy to fix, but others are subtle and tricky,
requiring examination of service code.

My current plan on this now, given how much needs to be fixed, is to
do a new upstream release (let's call it 1.2.4.1?) which reverts the
default back to open, *but* adds logging support such that we get a
syslog message when something would have been denied.  This should be
a relatively straightforward tweak of the current syslog patch.

In the meantime, there's no reason not to fix your service files now.
Please do so!  This mail still applies:

http://lists.freedesktop.org/archives/dbus/2008-December/010717.html

*with the exception* that you must not use bare <deny
send_interface="foo"/> as I initially suggested there.  Instead use:
<deny send_destination="org.foo.MyService"
send_interface="org.foo.MyInterface"/>

So in summary, get a new release out that lets people (other than me)
figure out more easily what's broken and work on fixing it, without
breaking compatibility for now.  Thoughts/opinions?
Comment 6 Tim Sammut (RETIRED) gentoo-dev 2011-09-08 20:08:16 UTC
Voting GLSA no.
Comment 7 Pierre-Yves Rofes (RETIRED) gentoo-dev 2011-10-08 21:58:35 UTC
voting no too, and closing.