Amazon Linux 1 Security Advisory: ALAS-2019-1246
Advisory Release Date: 2019-07-17 23:54 Pacific
Advisory Updated Date: 2019-07-25 18:48 Pacific
dbus as used in DBusServer, allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass. (CVE-2019-12749)
Affected Packages:
dbus
Issue Correction:
Run yum update dbus to update your system.
i686:
dbus-devel-1.6.12-14.29.amzn1.i686
dbus-debuginfo-1.6.12-14.29.amzn1.i686
dbus-libs-1.6.12-14.29.amzn1.i686
dbus-1.6.12-14.29.amzn1.i686
noarch:
dbus-doc-1.6.12-14.29.amzn1.noarch
src:
dbus-1.6.12-14.29.amzn1.src
x86_64:
dbus-libs-1.6.12-14.29.amzn1.x86_64
dbus-devel-1.6.12-14.29.amzn1.x86_64
dbus-debuginfo-1.6.12-14.29.amzn1.x86_64
dbus-1.6.12-14.29.amzn1.x86_64