In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1746057 | issue tracking third party advisory patch |
http://www.openwall.com/lists/oss-security/2019/09/03/1 | mailing list exploit third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2WNHRJW4XI6H5YMDG4BUFGPAXWUMUVG/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIKGKXZ5OEGOEYURHLJHEMFYNLEGAW5B/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRE5IS24XTF5WNZGH2L7GSQJKARBOEGL/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3592 | issue tracking third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3941 | issue tracking third party advisory patch vendor advisory |