CVE-2013-0292: authentication bypass due to insufficient checks in dbus-glib < 0.100.1

Simon McVittie simon.mcvittie at collabora.co.uk
Fri Feb 15 09:33:19 PST 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Sebastian Krahmer discovered and published an authentication bypass
vulnerability in pam_fprintd, caused by a bug in dbus-glib. It is
possible that other users of dbus-glib can be exploited in the same
way. CVE-2013-0292 has been allocated for this vulnerability.

This vulnerability is fixed in dbus-glib version 0.100.1 by git commit
166978a. All users of dbus-glib should upgrade.

<http://dbus.freedesktop.org/releases/dbus-glib/dbus-glib-0.100.1.tar.gz>
<http://dbus.freedesktop.org/releases/dbus-glib/dbus-glib-0.100.1.tar.gz.asc>
<http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca>

The D-Bus maintainers consider use of dbus-glib to be deprecated. We
encourage GLib application and library authors to switch to GDBus, which
has been part of GLib since 2.26.

Thanks to Sebastian Krahmer and Bastien Nocera for bringing this
vulnerability to our attention, and the Red Hat Security Response Team
for allocating a CVE ID.

Regards,
    S

-----BEGIN PGP SIGNATURE-----
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=Dr98
-----END PGP SIGNATURE-----


More information about the dbus mailing list