vulnerability
Amazon Linux 2023: CVE-2023-34969: Medium priority package update for dbus
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Jun 6, 2023 | Feb 17, 2025 | Jul 4, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jun 6, 2023
Added
Feb 17, 2025
Modified
Jul 4, 2025
Description
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.
An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.
Solutions
amazon-linux-2023-upgrade-dbusamazon-linux-2023-upgrade-dbus-commonamazon-linux-2023-upgrade-dbus-daemonamazon-linux-2023-upgrade-dbus-daemon-debuginfoamazon-linux-2023-upgrade-dbus-debuginfoamazon-linux-2023-upgrade-dbus-debugsourceamazon-linux-2023-upgrade-dbus-develamazon-linux-2023-upgrade-dbus-docamazon-linux-2023-upgrade-dbus-libsamazon-linux-2023-upgrade-dbus-libs-debuginfoamazon-linux-2023-upgrade-dbus-testsamazon-linux-2023-upgrade-dbus-tests-debuginfoamazon-linux-2023-upgrade-dbus-toolsamazon-linux-2023-upgrade-dbus-tools-debuginfoamazon-linux-2023-upgrade-dbus-x11amazon-linux-2023-upgrade-dbus-x11-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.