Arch Linux alert ASA-201601-30 (blueman)
| From: | Remi Gacogne <rgacogne@archlinux.org> | |
| To: | Discussion about security issues in Arch Linux and its packages <arch-security@archlinux.org> | |
| Subject: | [arch-security] [ASA-201601-30] blueman: privilege escalation | |
| Date: | Mon, 25 Jan 2016 23:17:02 +0100 | |
| Message-ID: | <56A69EDE.2040909@archlinux.org> |
Arch Linux Security Advisory ASA-201601-30 ========================================== Severity: Medium Date : 2016-01-25 CVE-ID : CVE-2015-8612 Package : blueman Type : privilege escalation Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package blueman before version 2.0.3-1 is vulnerable to local privilege escalation. Resolution ========== Upgrade to 2.0.3-1. # pacman -Syu "blueman>=2.0.3-1" The problem has been fixed upstream in version 2.0.3. Workaround ========== None. Description =========== A local privilege escalation vulnerability has been found in the Network::EnableNetwork() method of blueman. An unsanitized string is received over DBUS into the dhcp_handler parameter and passed to eval(), thus allowing arbitrary command execution with the privileges of the user running blueman. Impact ====== A local attacker can use this vulnerability to get root access on the affected host. References ========== https://bugs.archlinux.org/task/47784 https://access.redhat.com/security/cve/CVE-2015-8612 https://github.com/blueman-project/blueman/issues/416 https://github.com/blueman-project/blueman/commit/e3d2493...
