CVE-2015-0245
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
13/02/2015
Last modified:
12/04/2025
Description
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html



