SUSE SLED12 / SLES12 Security Update : dbus-1 (SUSE-SU-2016:2565-1)

high Nessus Plugin ID 94272

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for dbus-1 to version 1.8.22 fixes one security issue and bugs. The following security issue was fixed :

- bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string. The following upstream changes are included :

- Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus.

- Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008)

- Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952)

- Add locking to DBusCounter's reference count and notify function (fdo#89297)

- Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312)

- Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021)

- Correctly initialize all fields of DBusTypeReader (fdo#90021)

- Fix some missing \n in verbose (debug log) messages (fdo#90004)

- Clean up some memory leaks in test code (fdo#90021)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1502=1

SUSE Linux Enterprise Server 12-SP1:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1502=1

SUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1502=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1003898

http://www.nessus.org/u?f764993d

Plugin Details

Severity: High

ID: 94272

File Name: suse_SU-2016-2565-1.nasl

Version: 1.8

Type: local

Agent: unix

Published: 10/26/2016

Updated: 1/6/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:dbus, p-cpe:/a:novell:suse_linux:dbus-1-debuginfo, p-cpe:/a:novell:suse_linux:dbus-1-debugsource, p-cpe:/a:novell:suse_linux:dbus-1-x11, p-cpe:/a:novell:suse_linux:dbus-1-x11-debuginfo, p-cpe:/a:novell:suse_linux:dbus-1-x11-debugsource, p-cpe:/a:novell:suse_linux:libdbus-1, p-cpe:/a:novell:suse_linux:libdbus-1-3, p-cpe:/a:novell:suse_linux:libdbus-1-3-debuginfo, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/19/2016

Vulnerability Publication Date: 10/19/2016