diff options
author | Simon McVittie <smcv@debian.org> | 2015-01-02 11:06:03 +0000 |
---|---|---|
committer | Simon McVittie <smcv@debian.org> | 2015-01-02 11:06:03 +0000 |
commit | 9f7037805b3f6564710f92d8be80f1953b544884 (patch) | |
tree | 616e72d4427385ed1b3c03b24f2b55a802c90db3 /NEWS | |
parent | 61e47df2e5e26126ca8f304b55461b9d08bfbb00 (diff) | |
download | dbus-9f7037805b3f6564710f92d8be80f1953b544884.tar.gz |
Imported Upstream version 1.8.14upstream/1.8.14
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 31 |
1 files changed, 31 insertions, 0 deletions
@@ -1,3 +1,34 @@ +D-Bus 1.8.14 (2015-01-05) +== + +The “40lb of roofing nails” release. + +Security hardening: + +• Do not allow calls to UpdateActivationEnvironment from uids other than + the uid of the dbus-daemon. If a system service installs unsafe + security policy rules that allow arbitrary method calls + (such as CVE-2014-8148) then this prevents memory consumption and + possible privilege escalation via UpdateActivationEnvironment. + + We believe that in practice, privilege escalation here is avoided + by dbus-daemon-launch-helper sanitizing its environment; but + it seems better to be safe. + +• Do not allow calls to UpdateActivationEnvironment or the Stats interface + on object paths other than /org/freedesktop/DBus. Some system services + install unsafe security policy rules that allow arbitrary method calls + to any destination, method and interface with a specified object path; + while less bad than allowing arbitrary method calls, these security + policies are still harmful, since dbus-daemon normally offers the + same API on all object paths and other system services might behave + similarly. + +Other fixes: + +• Add missing initialization so GetExtendedTcpTable doesn't crash on + Windows Vista SP0 (fd.o #77008, Илья А. Ткаченко) + D-Bus 1.8.12 (2014-11-24) == |