First published: Fri Dec 18 2020(Updated: )
A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-bus Project D-bus | =1.12.20 | |
Linux Linux kernel | ||
All of | ||
Freedesktop Dbus | =1.12.20 | |
Linux Linux kernel | ||
redhat/dbus | <1.10.32 | 1.10.32 |
redhat/dbus | <1.12.20 | 1.12.20 |
redhat/dbus | <1.13.18 | 1.13.18 |
debian/dbus | 1.12.28-0+deb11u1 1.12.24-0+deb11u1 1.14.10-1~deb12u1 1.14.10-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35512 is a use-after-free vulnerability found in D-Bus that allows an attacker to execute arbitrary code or cause a denial of service.
The severity of CVE-2020-35512 is high with a CVSS score of 7.8.
D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 are affected by CVE-2020-35512.
An attacker can exploit CVE-2020-35512 by leveraging the use-after-free flaw to execute arbitrary code or perform a denial of service attack.
The recommended remedy for CVE-2020-35512 is to update D-Bus to version 1.12.20 or higher, or 1.10.32 for older branches.