Activity log for bug #306362

Date Who What changed Old value New value Message
2008-12-09 00:07:32 Scott James Remnant (Canonical) bug added bug
2008-12-09 00:09:18 Scott James Remnant (Canonical) description Binary package hint: dbus From dbus-bounces@lists.freedesktop.org Fri Dec 5 19:55:35 2008 Return-path: <dbus-bounces@lists.freedesktop.org> Envelope-to: scott+canonical@netsplit.com Delivery-date: Fri, 05 Dec 2008 19:55:35 +0000 Received: from fiordland.canonical.com ([91.189.94.145]) by zelda.netsplit.com with esmtp (Exim 4.69) (envelope-from <dbus-bounces@lists.freedesktop.org>) id 1L8glz-0008Lu-Jr for scott+canonical@netsplit.com; Fri, 05 Dec 2008 19:55:35 +0000 Received: from cluster-e.mailcontrol.com (cluster-e.mailcontrol.com [85.115.58.190]) by fiordland.canonical.com (Postfix) with ESMTP id A2228B68256; Fri, 5 Dec 2008 19:55:12 +0000 (GMT) Received: from arctowski.canonical.com (arctowski.canonical.com [91.189.94.158]) by rly14e.srv.mailcontrol.com (MailControl) with ESMTP id mB5JtBXk031219; Fri, 5 Dec 2008 19:55:11 GMT Received: from fiordland.canonical.com ([91.189.94.145]) by arctowski.canonical.com with esmtp (Exim 4.60) (envelope-from <dbus-bounces@lists.freedesktop.org>) id 1L8glb-0005dd-Id; Fri, 05 Dec 2008 19:55:11 +0000 Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) by fiordland.canonical.com (Postfix) with ESMTP id C49C8B68256; Fri, 5 Dec 2008 19:55:10 +0000 (GMT) Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 7EA2C9E8BE; Fri, 5 Dec 2008 11:55:08 -0800 (PST) X-Original-To: dbus@lists.freedesktop.org Delivered-To: dbus@lists.freedesktop.org Received: from an-out-0708.google.com (an-out-0708.google.com [209.85.132.249]) by gabe.freedesktop.org (Postfix) with ESMTP id D3FBB9E741 for <dbus@lists.freedesktop.org>; Fri, 5 Dec 2008 11:55:05 -0800 (PST) Received: by an-out-0708.google.com with SMTP id d11so111353and.39 for <dbus@lists.freedesktop.org>; Fri, 05 Dec 2008 11:55:05 -0800 (PST) Received: by 10.100.242.20 with SMTP id p20mr252471anh.75.1228506904963; Fri, 05 Dec 2008 11:55:04 -0800 (PST) Received: by 10.100.127.20 with HTTP; Fri, 5 Dec 2008 11:55:04 -0800 (PST) Message-ID: <faa16b610812051155u74d1f7b8na7e7f61eca5c0ef9@mail.gmail.com> Date: Fri, 5 Dec 2008 14:55:04 -0500 From: "Colin Walters" <walters@verbum.org> To: dbus <dbus@lists.freedesktop.org> Subject: [CVE-2008-4311] DBus 1.2.6 MIME-Version: 1.0 Content-Disposition: inline X-Google-Sender-Auth: 916061a5b371d5d2 X-BeenThere: dbus@lists.freedesktop.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: <dbus.lists.freedesktop.org> List-Unsubscribe: <http://lists.freedesktop.org/mailman/listinfo/dbus>, <mailto:dbus-request@lists.freedesktop.org?subject=unsubscribe> List-Archive: <http://lists.freedesktop.org/archives/dbus> List-Post: <mailto:dbus@lists.freedesktop.org> List-Help: <mailto:dbus-request@lists.freedesktop.org?subject=help> List-Subscribe: <http://lists.freedesktop.org/mailman/listinfo/dbus>, <mailto:dbus-request@lists.freedesktop.org?subject=subscribe> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: dbus-bounces@lists.freedesktop.org Errors-To: dbus-bounces@lists.freedesktop.org X-Mailcontrol-Inbound: uq3drnD2P+ps5SfEb0fvr78+NoP1DHBZwGqKpaXB2eTgNv8D6KLIxb8+NoP1DHBZ8VSaBg0k0xw= X-Spam-Score: -3.5 X-Scanned-By: MailControl A_08_51_00 (www.mailcontrol.com) on 10.69.0.124 X-Evolution-Source: imap://scott+canonical@imap.netsplit.com/ A new security release of DBus is now available: http://dbus.freedesktop.org/dbus/releases/dbus-1.2.6.tar.gz This release contains a (partial, see below) fix for: https://bugs.freedesktop.org/show_bug.cgi?id=18229 == Summary == Joachim Breitner discovered a mistake in the default configuration for the system bus (system.conf) which made the default policy for both sent and received messages effectively *allow*, and not deny as intended. This release fixes the send side permission, but does not change the receive. See below for more details. == Available workarounds == Add explicit <deny> rules to existing policy files which do not already have them. == Mitigating factors == There are three important mitigating factors. * First, in an examination of a Fedora 10 system, many services contained explicit <deny> rules under the "default" context. These deny rules did (and continue to) operate as expected. * Second, an increasing trend has been for core system services to use PolicyKit, or otherwise do security checks on the service side. Any system which relies on PolicyKit is unaffected by this flaw. * Third, the SELinux DBus support is not affected by this flaw. Now, as mentioned above this fix is partial. DBus has two kinds of policy permissions, send and receive. Generally speaking, the send side permission is much more important. However, DBus has supported receive side permissions for a few reasons, among those are: * Ensuring signals containing sensitive data aren't visible by unexpected processes. Suggested fix: Do not put sensitive data in DBus signals; use targeted method calls. * A way for processes to "second-pass" filter messages before they reach their C code. Suggested fix: Something like PolicyKit (or just manual service-side permission checks) remain a better way to do this. For compatibility reasons, this release only fixes the send-side permission check, and not receive. A greater number of services will need to be updated for a future tightening of the receive permission. We are as yet unsure when (and in fact, if) the receive permission will be tightened in the DBus 1.2 stable branch. We will gather information about any affected programs and make a final determination at in the near future. == Conclusion Summary == * Add explicit <deny> rules under the default policy if this is applicable to your service (i.e. not using PolicyKit or similar) * Do not put sensitive information in signals == Thanks == Thanks to Joachim Breitner for the initial report and proposed patch, Tomas Hoger for the current fix, and others for their assistance with this issue. _______________________________________________ dbus mailing list dbus@lists.freedesktop.org http://lists.freedesktop.org/mailman/listinfo/dbus A new security release of DBus is now available: http://dbus.freedesktop.org/dbus/releases/dbus-1.2.6.tar.gz This release contains a (partial, see below) fix for: https://bugs.freedesktop.org/show_bug.cgi?id=18229 == Summary == Joachim Breitner discovered a mistake in the default configuration for the system bus (system.conf) which made the default policy for both sent and received messages effectively *allow*, and not deny as intended. This release fixes the send side permission, but does not change the receive. See below for more details. == Available workarounds == Add explicit <deny> rules to existing policy files which do not already have them. == Mitigating factors == There are three important mitigating factors. * First, in an examination of a Fedora 10 system, many services contained explicit <deny> rules under the "default" context. These deny rules did (and continue to) operate as expected. * Second, an increasing trend has been for core system services to use PolicyKit, or otherwise do security checks on the service side. Any system which relies on PolicyKit is unaffected by this flaw. * Third, the SELinux DBus support is not affected by this flaw. Now, as mentioned above this fix is partial. DBus has two kinds of policy permissions, send and receive. Generally speaking, the send side permission is much more important. However, DBus has supported receive side permissions for a few reasons, among those are: * Ensuring signals containing sensitive data aren't visible by unexpected processes. Suggested fix: Do not put sensitive data in DBus signals; use targeted method calls. * A way for processes to "second-pass" filter messages before they reach their C code. Suggested fix: Something like PolicyKit (or just manual service-side permission checks) remain a better way to do this. For compatibility reasons, this release only fixes the send-side permission check, and not receive. A greater number of services will need to be updated for a future tightening of the receive permission. We are as yet unsure when (and in fact, if) the receive permission will be tightened in the DBus 1.2 stable branch. We will gather information about any affected programs and make a final determination at in the near future. == Conclusion Summary == * Add explicit <deny> rules under the default policy if this is applicable to your service (i.e. not using PolicyKit or similar) * Do not put sensitive information in signals == Thanks == Thanks to Joachim Breitner for the initial report and proposed patch, Tomas Hoger for the current fix, and others for their assistance with this issue. _______________________________________________ dbus mailing list dbus@lists.freedesktop.org http://lists.freedesktop.org/mailman/listinfo/dbus
2008-12-09 00:09:59 Scott James Remnant (Canonical) dbus: status New In Progress
2008-12-09 00:09:59 Scott James Remnant (Canonical) dbus: importance Undecided Critical
2008-12-09 00:09:59 Scott James Remnant (Canonical) dbus: statusexplanation
2008-12-09 00:10:23 Scott James Remnant (Canonical) bug assigned to dbus
2008-12-09 00:10:37 Scott James Remnant (Canonical) bug added subscriber Ubuntu Security Team
2008-12-09 00:24:46 Bug Watch Updater dbus: status Unknown In Progress
2008-12-10 01:19:11 Scott James Remnant (Canonical) dbus: assignee scott
2009-01-05 18:29:29 Ansgar Burchardt bug assigned to dbus (Debian)
2009-01-14 14:03:19 Adam Buchbinder bug assigned to dbus (Fedora)
2009-01-19 12:15:17 Launchpad Janitor dbus: status In Progress Fix Released
2009-01-20 22:18:13 Bug Watch Updater dbus: status Unknown Fix Released
2009-12-05 17:12:33 Launchpad Janitor branch linked lp:ubuntu/dbus
2010-01-09 22:02:11 Bug Watch Updater dbus: status In Progress Fix Released
2010-09-13 20:55:11 Bug Watch Updater dbus: importance Unknown Medium
2010-09-13 20:55:19 Bug Watch Updater bug watch added http://bugs.freedesktop.org/show_bug.cgi?id=18931
2010-09-13 20:55:19 Bug Watch Updater bug watch added http://bugs.freedesktop.org/show_bug.cgi?id=18948
2010-09-13 20:55:19 Bug Watch Updater bug watch added http://bugs.freedesktop.org/show_bug.cgi?id=18961
2011-01-25 12:04:36 Bug Watch Updater dbus: importance Medium Unknown
2011-02-03 20:35:57 Bug Watch Updater dbus: importance Unknown Medium
2011-08-11 01:02:24 Bug Watch Updater dbus (Debian): status Unknown Fix Released
2017-10-26 23:12:10 Bug Watch Updater dbus (Fedora): importance Unknown Medium