diff options
author | Simon McVittie <smcv@collabora.com> | 2020-04-16 14:45:11 +0100 |
---|---|---|
committer | Simon McVittie <smcv@collabora.com> | 2020-06-02 10:42:07 +0100 |
commit | 872b085f12f56da25a2dbd9bd0b2dff31d5aea63 (patch) | |
tree | 71a7fe60c80a7ac54a0b113c3e658785af718dd4 /AUTHORS | |
parent | 9a651fa7e66c997565267cc232f089cae541b851 (diff) | |
download | dbus-872b085f12f56da25a2dbd9bd0b2dff31d5aea63.tar.gz |
sysdeps-unix: On MSG_CTRUNC, close the fds we did receive
MSG_CTRUNC indicates that we have received fewer fds that we should
have done because the buffer was too small, but we were treating it
as though it indicated that we received *no* fds. If we received any,
we still have to make sure we close them, otherwise they will be leaked.
On the system bus, if an attacker can induce us to leak fds in this
way, that's a local denial of service via resource exhaustion.
Reported-by: Kevin Backhouse, GitHub Security Lab
Fixes: dbus#294
Fixes: CVE-2020-12049
Fixes: GHSL-2020-057
Diffstat (limited to 'AUTHORS')
0 files changed, 0 insertions, 0 deletions