NA

CVE-2024-1930

Published: 08/05/2024 Updated: 08/05/2024

Vulnerability Summary

No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server prior to 5.1.17 allows a malicious user to impact Availability via No Limit on Number of Open Sessions. There is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method. For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.

Vulnerability Trend

Mailing Lists

Hello list, please find below a report about a local root exploit and other issues in dnf5daemon-server We also offer a rendered HTML version of the report on our blog [1] 1) Introduction =============== The dnf5daemon-server [2] component offers a collection of D-Bus interfaces to interact with the dnf5 package manager on the system An openS ...