<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">dbus-1-1.10.12-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10517-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">dbus-1-1.10.12-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the dbus-1-1.10.12-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10517</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4352/</URL>
      <Description>SUSE CVE CVE-2010-4352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3524/</URL>
      <Description>SUSE CVE CVE-2012-3524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2168/</URL>
      <Description>SUSE CVE CVE-2013-2168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3477/</URL>
      <Description>SUSE CVE CVE-2014-3477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3532/</URL>
      <Description>SUSE CVE CVE-2014-3532 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3533/</URL>
      <Description>SUSE CVE CVE-2014-3533 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3635/</URL>
      <Description>SUSE CVE CVE-2014-3635 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3636/</URL>
      <Description>SUSE CVE CVE-2014-3636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3637/</URL>
      <Description>SUSE CVE CVE-2014-3637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3638/</URL>
      <Description>SUSE CVE CVE-2014-3638 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3639/</URL>
      <Description>SUSE CVE CVE-2014-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7824/</URL>
      <Description>SUSE CVE CVE-2014-7824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8148/</URL>
      <Description>SUSE CVE CVE-2014-8148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0245/</URL>
      <Description>SUSE CVE CVE-2015-0245 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dbus-1-1.10.12-2.1">
      <FullProductName ProductID="dbus-1-1.10.12-2.1">dbus-1-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dbus-1-devel-1.10.12-2.1">
      <FullProductName ProductID="dbus-1-devel-1.10.12-2.1">dbus-1-devel-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dbus-1-devel-32bit-1.10.12-2.1">
      <FullProductName ProductID="dbus-1-devel-32bit-1.10.12-2.1">dbus-1-devel-32bit-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dbus-1-devel-doc-1.10.12-2.1">
      <FullProductName ProductID="dbus-1-devel-doc-1.10.12-2.1">dbus-1-devel-doc-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dbus-1-x11-1.10.12-2.1">
      <FullProductName ProductID="dbus-1-x11-1.10.12-2.1">dbus-1-x11-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdbus-1-3-1.10.12-2.1">
      <FullProductName ProductID="libdbus-1-3-1.10.12-2.1">libdbus-1-3-1.10.12-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdbus-1-3-32bit-1.10.12-2.1">
      <FullProductName ProductID="libdbus-1-3-32bit-1.10.12-2.1">libdbus-1-3-32bit-1.10.12-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dbus-1-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dbus-1-1.10.12-2.1">dbus-1-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dbus-1-devel-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1">dbus-1-devel-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dbus-1-devel-32bit-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1">dbus-1-devel-32bit-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dbus-1-devel-doc-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1">dbus-1-devel-doc-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dbus-1-x11-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1">dbus-1-x11-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdbus-1-3-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1">libdbus-1-3-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdbus-1-3-32bit-1.10.12-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1">libdbus-1-3-32bit-1.10.12-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.</Note>
    </Notes>
    <CVE>CVE-2010-4352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4352.html</URL>
        <Description>CVE-2010-4352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/659934</URL>
        <Description>SUSE Bug 659934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."</Note>
    </Notes>
    <CVE>CVE-2012-3524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3524.html</URL>
        <Description>CVE-2012-3524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697105</URL>
        <Description>SUSE Bug 697105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/852781</URL>
        <Description>SUSE Bug 852781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912016</URL>
        <Description>SUSE Bug 912016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.</Note>
    </Notes>
    <CVE>CVE-2013-2168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2168.html</URL>
        <Description>CVE-2013-2168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/824607</URL>
        <Description>SUSE Bug 824607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.</Note>
    </Notes>
    <CVE>CVE-2014-3477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3477.html</URL>
        <Description>CVE-2014-3477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010769</URL>
        <Description>SUSE Bug 1010769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/881137</URL>
        <Description>SUSE Bug 881137</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.</Note>
    </Notes>
    <CVE>CVE-2014-3532</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3532.html</URL>
        <Description>CVE-2014-3532</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885241</URL>
        <Description>SUSE Bug 885241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.</Note>
    </Notes>
    <CVE>CVE-2014-3533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3533.html</URL>
        <Description>CVE-2014-3533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885241</URL>
        <Description>SUSE Bug 885241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.</Note>
    </Notes>
    <CVE>CVE-2014-3635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3635.html</URL>
        <Description>CVE-2014-3635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896453</URL>
        <Description>SUSE Bug 896453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.</Note>
    </Notes>
    <CVE>CVE-2014-3636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3636.html</URL>
        <Description>CVE-2014-3636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896453</URL>
        <Description>SUSE Bug 896453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904017</URL>
        <Description>SUSE Bug 904017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.</Note>
    </Notes>
    <CVE>CVE-2014-3637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3637.html</URL>
        <Description>CVE-2014-3637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896453</URL>
        <Description>SUSE Bug 896453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.</Note>
    </Notes>
    <CVE>CVE-2014-3638</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3638.html</URL>
        <Description>CVE-2014-3638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896453</URL>
        <Description>SUSE Bug 896453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903055</URL>
        <Description>SUSE Bug 903055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903057</URL>
        <Description>SUSE Bug 903057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.</Note>
    </Notes>
    <CVE>CVE-2014-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3639.html</URL>
        <Description>CVE-2014-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/896453</URL>
        <Description>SUSE Bug 896453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903055</URL>
        <Description>SUSE Bug 903055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903057</URL>
        <Description>SUSE Bug 903057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.</Note>
    </Notes>
    <CVE>CVE-2014-7824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7824.html</URL>
        <Description>CVE-2014-7824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904017</URL>
        <Description>SUSE Bug 904017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.</Note>
    </Notes>
    <CVE>CVE-2014-8148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8148.html</URL>
        <Description>CVE-2014-8148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912023</URL>
        <Description>SUSE Bug 912023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.</Note>
    </Notes>
    <CVE>CVE-2015-0245</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dbus-1-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-32bit-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-devel-doc-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dbus-1-x11-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-1.10.12-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libdbus-1-3-32bit-1.10.12-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0245.html</URL>
        <Description>CVE-2015-0245</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003898</URL>
        <Description>SUSE Bug 1003898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916343</URL>
        <Description>SUSE Bug 916343</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
