CVE Vulnerabilities

CVE-2020-12049

Improper Resource Shutdown or Release

Published: Jun 08, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
6.5 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system services private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
DbusFreedesktop1.3.0 (including)1.12.18 (excluding)
Red Hat Enterprise Linux 7RedHatdbus-1:1.10.24-14.el7_8*
Red Hat Enterprise Linux 8RedHatdbus-1:1.12.8-10.el8_2*
Red Hat Enterprise Linux 8RedHatdbus-1:1.12.8-10.el8_2*
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsRedHatdbus-1:1.12.8-8.el8_0*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatdbus-1:1.12.8-10.el8_1*
DbusUbuntubionic*
DbusUbuntudevel*
DbusUbuntueoan*
DbusUbuntuesm-infra-legacy/trusty*
DbusUbuntuesm-infra/bionic*
DbusUbuntuesm-infra/focal*
DbusUbuntuesm-infra/xenial*
DbusUbuntufocal*
DbusUbuntutrusty*
DbusUbuntutrusty/esm*
DbusUbuntuupstream*
DbusUbuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References