JLSEC-2025-22

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-22.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-22.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2025-22
Upstream
Published
2025-10-10T14:27:45.619Z
Modified
2025-11-06T23:03:21.145059Z
Summary
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon
Details

D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.

Database specific
{
    "sources": [
        {
            "modified": "2025-06-09T15:15:29.340Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-34969",
            "imported": "2025-10-10T13:32:22.008Z",
            "id": "CVE-2023-34969",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34969",
            "published": "2023-06-08T03:15:08.970Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / Dbus_jll

Package

Name
Dbus_jll
Purl
pkg:julia/Dbus_jll?uuid=ee1fde0b-3d02-5ea6-8484-8dfef6360eab

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.10+0