Copied from the advisory I just sent out: Sebastian Krahmer discovered and published an authentication bypass vulnerability in pam_fprintd, caused by a bug in dbus-glib. It is possible that other users of dbus-glib can be exploited in the same way. CVE-2013-0292 has been allocated for this vulnerability. This vulnerability is fixed in dbus-glib version 0.100.1 by git commit 166978a. All users of dbus-glib should upgrade. <http://dbus.freedesktop.org/releases/dbus-glib/dbus-glib-0.100.1.tar.gz> <http://dbus.freedesktop.org/releases/dbus-glib/dbus-glib-0.100.1.tar.gz.asc> <http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca> The D-Bus maintainers consider use of dbus-glib to be deprecated. We encourage GLib application and library authors to switch to GDBus, which has been part of GLib since 2.26. Thanks to Sebastian Krahmer and Bastien Nocera for bringing this vulnerability to our attention, and the Red Hat Security Response Team for allocating a CVE ID.
This is fixed in the 0.100.1 point release, which has no other changes from 0.100. It will also be fixed in 0.102 when that happens.
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.