Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-10-01 Thread Moritz Mühlenhoff
On Sat, Sep 29, 2012 at 04:58:55PM +0100, Simon McVittie wrote: > On 28/09/12 22:30, Geoffrey Thomas wrote: > > CVE-2012-3524 is about setuid binaries linking libdbus being easily > > trickable to do bad things via a malicious PATH (for finding > > dbus-launch), or through a DBUS_* address variable

Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-09-29 Thread Simon McVittie
On 28/09/12 22:30, Geoffrey Thomas wrote: > CVE-2012-3524 is about setuid binaries linking libdbus being easily > trickable to do bad things via a malicious PATH (for finding > dbus-launch), or through a DBUS_* address variable using the unixexec > address type. Potentially-vulnerable binaries are

Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-09-29 Thread Simon McVittie
On 29/09/12 15:44, Simon McVittie wrote: > I believe the libdbus part of this CVE affects wheezy and certain unusual > squeeze configurations. The known vectors for privilege escalation are: > > * tell libdbus (explicitly or via it being the session-bus default) to > connect to autolaunch: which

Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-09-29 Thread Simon McVittie
On Fri, 28 Sep 2012 at 14:30:37 -0700, Geoffrey Thomas wrote: > CVE-2012-3524 is about setuid binaries linking libdbus being easily > trickable to do bad things via a malicious PATH (for finding > dbus-launch), or through a DBUS_* address variable using the > unixexec address type. This also affec

Bug#689070: Please take upstream D-Bus patches for CVE-2012-3524

2012-09-28 Thread Geoffrey Thomas
Package: dbus Severity: serious Justification: local privilege escalation Tags: security Hi, CVE-2012-3524 is about setuid binaries linking libdbus being easily trickable to do bad things via a malicious PATH (for finding dbus-launch), or through a DBUS_* address variable using the unixexec ad