Search for packages
Package details: pkg:deb/ubuntu/dbus@1.0.1-2ubuntu1
purl pkg:deb/ubuntu/dbus@1.0.1-2ubuntu1
Next non-vulnerable version 1.12.14-1ubuntu2.1
Latest non-vulnerable version 1.12.16-2ubuntu2.1
Risk 4.0
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-36vh-mccp-aaag
Aliases:
CVE-2020-12049
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
1.12.14-1ubuntu2.1
Affected by 0 other vulnerabilities.
1.12.16-2ubuntu2.1
Affected by 0 other vulnerabilities.
VCID-3jg4-8sst-aaak
Aliases:
CVE-2019-12749
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
1.12.2-1ubuntu1.1
Affected by 1 other vulnerability.
VCID-6ffe-11sh-aaaq
Aliases:
CVE-2014-3477
The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
1.6.18-0ubuntu4.1
Affected by 9 other vulnerabilities.
VCID-a54h-24q6-aaas
Aliases:
CVE-2015-0245
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
1.6.18-0ubuntu4.4
Affected by 2 other vulnerabilities.
1.10.6-1ubuntu3
Affected by 2 other vulnerabilities.
VCID-cca7-v9er-aaad
Aliases:
CVE-2014-3533
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
1.6.18-0ubuntu4.1
Affected by 9 other vulnerabilities.
VCID-ej1j-er1p-aaan
Aliases:
CVE-2014-3638
The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
1.6.18-0ubuntu4.2
Affected by 4 other vulnerabilities.
VCID-ggrc-9p7x-aaag
Aliases:
CVE-2014-3639
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
1.6.18-0ubuntu4.2
Affected by 4 other vulnerabilities.
VCID-kd4r-kds7-aaad
Aliases:
CVE-2014-3635
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
1.6.18-0ubuntu4.2
Affected by 4 other vulnerabilities.
VCID-ne64-dksp-aaap
Aliases:
CVE-2014-3636
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
1.6.18-0ubuntu4.2
Affected by 4 other vulnerabilities.
VCID-nz6j-915h-aaaq
Aliases:
CVE-2014-3532
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
1.6.18-0ubuntu4.1
Affected by 9 other vulnerabilities.
VCID-r4xa-t89f-aaah
Aliases:
CVE-2014-7824
D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
1.6.18-0ubuntu4.3
Affected by 3 other vulnerabilities.
VCID-w2jk-k9zm-aaar
Aliases:
CVE-2014-3637
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
1.6.18-0ubuntu4.2
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version