Summary: | session bus does not restrict connections base on uid | ||
---|---|---|---|
Product: | dbus | Reporter: | Daniel Reed <djr> |
Component: | core | Assignee: | Havoc Pennington <hp> |
Status: | RESOLVED FIXED | QA Contact: | |
Severity: | major | ||
Priority: | high | CC: | bressers, johnp, mjc |
Version: | unspecified | ||
Hardware: | x86 (IA32) | ||
OS: | Linux (All) | ||
Whiteboard: | |||
i915 platform: | i915 features: | ||
Attachments: |
possible fix
better fix |
Description
Daniel Reed
2005-01-31 15:01:53 UTC
Created attachment 1802 [details] [review] possible fix s/=/==/ in that patch... Created attachment 1803 [details] [review] better fix s/=/==/ After discussion we decided allowing root was bad, you can always put <allow user="root"/> in the conf file if you want. I've assigned CAN-2005-0201 to this issue. This was fixed some time ago Um. This patch only ever got applied to the 0.2x branch, which means that 0.3x is still vulnerable. Recommend applying this to HEAD and releasing 0.36.2 with no further changes immediately. restricting to newly-formed dbus security group j5 -- can we do 0.36.2? Fix is in CVS on the DBUS_0_36_2 and HEAD branches and released at http:// http://dbus.freedesktop.org/releases/dbus-0.36.2.tar.gz Opening up bug since it is public |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.