CVE-2023-34969

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-34969
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-34969.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-34969
Downstream
Related
Published
2023-06-08T03:15:08Z
Modified
2025-10-10T04:35:16.566184Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.

References

Affected packages

Git / gitlab.freedesktop.org/dbus/dbus

Affected ranges

Type
GIT
Repo
https://gitlab.freedesktop.org/dbus/dbus
Events

Affected versions

dbus-1.*

dbus-1.12.0
dbus-1.12.10
dbus-1.12.12
dbus-1.12.14
dbus-1.12.16
dbus-1.12.18
dbus-1.12.2
dbus-1.12.20
dbus-1.12.22
dbus-1.12.24
dbus-1.12.26
dbus-1.12.4
dbus-1.12.6
dbus-1.12.8