[USN-5244-1] DBus vulnerability

Camila Camargo de Matos camila.camargodematos at canonical.com
Thu Jan 20 20:25:07 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5244-1
January 20, 2022

dbus vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

DBus could be made to crash if it received specially crafted
input.

Software Description:
- dbus: simple interprocess messaging system

Details:

Daniel Onaca discovered that DBus contained a use-after-free vulnerability,
caused by the incorrect handling of usernames sharing the same UID. An
attacker could possibly use this issue to cause DBus to crash, resulting
in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
dbus 1.10.6-1ubuntu3.6+esm1
libdbus-1-3 1.10.6-1ubuntu3.6+esm1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5244-1
CVE-2020-35512

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220120/1601ce0c/attachment.sig>


More information about the ubuntu-security-announce mailing list