|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202101-26 (gobby)

From:  Morten Linderud via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202101-26] gobby: denial of service
Date:  Thu, 28 Jan 2021 22:59:09 +0100
Message-ID:  <20210128215909.vx6wvh76skdyj5aa@anathema>
Cc:  Morten Linderud <foxboron@archlinux.org>

Arch Linux Security Advisory ASA-202101-26 ========================================== Severity: Low Date : 2021-01-20 CVE-ID : CVE-2020-35450 Package : gobby Type : denial of service Remote : No Link : https://security.archlinux.org/AVG-1383 Summary ======= The package gobby before version 1:0.5.0+116+g295e697-1 is vulnerable to denial of service. Resolution ========== Upgrade to 1:0.5.0+116+g295e697-1. # pacman -Syu "gobby>=1:0.5.0+116+g295e697-1" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== Gobby 0.4.11 allows a NULL pointer dereference in the D-Bus handler for certain set_language calls. Impact ====== A local attacker can crash the application through a crafted dbus message. References ========== https://bugs.archlinux.org/task/69118 https://github.com/gobby/gobby/issues/183 https://github.com/gobby/gobby/pull/184 https://github.com/gobby/gobby/commit/295e697ac83c6638bc7... https://security.archlinux.org/CVE-2020-35450


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds