This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201308-02">
<title>D-Bus: Denial of service</title>
<synopsis>A vulnerability has been found in D-Bus which allows a local user
to cause a Denial of Service.
</synopsis>
<producttype="ebuild">d-bus</product>
<announced>2013-08-22</announced>
<revisedcount="1">2013-08-22</revised>
<bug>473190</bug>
<access>local</access>
<affected>
<packagename="sys-apps/dbus"auto="yes"arch="*">
<unaffectedrange="ge">1.6.12</unaffected>
<vulnerablerange="lt">1.6.12</vulnerable>
</package>
</affected>
<background>
<p>D-Bus is a message bus system which processes can use to talk to each
other.
</p>
</background>
<description>
<p>D-Bus’ _dbus_printf_string_upper_bound() function crashes if it
returns exactly 1024 bytes.
</p>
</description>
<impacttype="normal">
<p>A local attacker could provide specially-crafted input to an application
using D-Bus which would cause _dbus_printf_string_upper_bound() to return
1024 bytes and crash, causing a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All D-Bus users should upgrade to the latest version:</p>