QID 354106

Date Published: 2022-11-10

QID 354106: Amazon Linux Security Advisory for dbus : ALAS2-2022-1870

A flaw was found in dbus.
The implementation of dbus_cookie_sha1 is susceptible to a symbolic link attack.
A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the dbusserver to read and write in unintended locations resulting in an authentication bypass.
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (
( CVE-2019-12749) an uncontrolled resource consumption vulnerability was discovered in d-bus.
The dbusserver leaks file descriptors when a message exceeds the per-message file descriptor limit.
This flaw allows a local attacker with access to the d-bus system bus or another system service's private af_unix socket, to make the system service reach its file descriptor limit, denying service to subsequent d-bus clients.
As a result, the system may become unusable for other users, and some services may stop working.
The highest threat from this vulnerability is to system availability. (
( CVE-2020-12049)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 3.6 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1870 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354106

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1870 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1870.html