CVE-2014-3635

NameCVE-2014-3635
DescriptionOff-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3026-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dbus (PTS)bullseye1.12.28-0+deb11u1fixed
bullseye (security)1.12.24-0+deb11u1fixed
bookworm1.14.10-1~deb12u1fixed
sid, trixie1.14.10-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dbussourcesqueeze(not affected)
dbussourcewheezy1.6.8-1+deb7u4DSA-3026-1
dbussource(unstable)1.8.8-1

Notes

[squeeze] - dbus <not-affected> (Version in Squeeze does not support FD passing with SCM_RIGHTS)
https://bugs.freedesktop.org/show_bug.cgi?id=83622

Search for package or bug name: Reporting problems