SUSE SLED12 / SLES12 Security Update : dbus-1 (SUSE-SU-2016:2565-1)

High Nessus Plugin ID 94272


The remote SUSE host is missing one or more security updates.


This update for dbus-1 to version 1.8.22 fixes one security issue and bugs. The following security issue was fixed :

- bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string. The following upstream changes are included :

- Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus.

- Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008)

- Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952)

- Add locking to DBusCounter's reference count and notify function (fdo#89297)

- Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312)

- Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021)

- Correctly initialize all fields of DBusTypeReader (fdo#90021)

- Fix some missing \n in verbose (debug log) messages (fdo#90004)

- Clean up some memory leaks in test code (fdo#90021)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 12-SP1:zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1502=1

SUSE Linux Enterprise Server 12-SP1:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1502=1

SUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1502=1

To bring your system up-to-date, use 'zypper patch'.

See Also

Plugin Details

Severity: High

ID: 94272

File Name: suse_SU-2016-2565-1.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2016/10/26

Modified: 2016/10/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:dbus, p-cpe:/a:novell:suse_linux:dbus-1-debuginfo, p-cpe:/a:novell:suse_linux:dbus-1-debugsource, p-cpe:/a:novell:suse_linux:dbus-1-x11, p-cpe:/a:novell:suse_linux:dbus-1-x11-debuginfo, p-cpe:/a:novell:suse_linux:dbus-1-x11-debugsource, p-cpe:/a:novell:suse_linux:libdbus-1, p-cpe:/a:novell:suse_linux:libdbus-1-3, p-cpe:/a:novell:suse_linux:libdbus-1-3-debuginfo, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/10/19

Reference Information

OSVDB: 145548