Groups | Search | Server Info | Login | Register
Groups > linux.debian.announce.security > #4790
| From | Moritz Muehlenhoff <jmm@debian.org> |
|---|---|
| Newsgroups | linux.debian.announce.security |
| Subject | [SECURITY] [DSA 6224-1] xdg-dbus-proxy security update |
| Date | 2026-04-22 10:50 +0200 |
| Message-ID | <MMBrs-h5z1-25@gated-at.bofh.it> (permalink) |
| Organization | linux.* mail to news gateway |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6224-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 22, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xdg-dbus-proxy CVE ID : CVE-2026-34080 It was discovered that incorrect parsing of policy rules in the xdg-dbus-proxy (a filtering proxy for D-Bus connections) allowed the bypass of eavesdrop restrictions, which could result in information disclosure. For the oldstable distribution (bookworm), this problem has been fixed in version 0.1.4-3+deb12u1. We recommend that you upgrade your xdg-dbus-proxy packages. For the detailed security status of xdg-dbus-proxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xdg-dbus-proxy Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmnoiDsACgkQEMKTtsN8 TjZDrBAAog26abampqsBFmAJiRbDYasR2FL1yrzq7PO8+Nj/5woBr3gxf8epTrQ5 ort20DdmkGM1jsRzCXIqbW9hHkQQopo57qFFHslRd8G9fvMzOg167cGJFta6IASG 2dnKe5jesd441z1D9dAsb7Vtto7voQKOku2THxevjKR/iYcVnCO0tzM1zRg1Ynsr LkFou2GyrV2SyJHRhwA/kStwo8YjiVJ7oo/o4hynZ3qkXreFCBrIZLCAwYX0uFHB eItRUpwd3t7/avkyQHe+kHgU6Mxrd+Ii3ZRoplT6Lv1StaDIYHFoMkklOrp2cGuh L1kZYPAvlCDgYWt2yX4qudT8wUt+K7L09BYNeI7c24HXEhAtk1mf5r2hrmz+xzvJ cr11gfPopLnyshpau7SNCfcU7v6B9LHHrWDf67mcQA1GrfmmH/KqrmXFTHBjMKtj L/rGZc/PYoDod8fKhCvkgUVob8VeYsn3oREPl+X9QEcHHoZbn3fMuMThGZjFYQOW fHHS8GXMbEQ1wbbMnJCqj2mtfDQo9hfy85mBhsnaHztUCrYPzyqVpvO94Om9zxL4 TLj2h0DbDwn7Pwqy9XDHsfnYY8v5mwZUBkUAd/gezsW1AwDa9toyR1JFnBdzyL63 hkisuKUgledV8tv7JxlbNvXV+MvzGcG2dM61RRU8yk7Go4Rfwo0= =/R4P -----END PGP SIGNATURE-----
Back to linux.debian.announce.security | Previous | Next | Find similar
[SECURITY] [DSA 6224-1] xdg-dbus-proxy security update Moritz Muehlenhoff <jmm@debian.org> - 2026-04-22 10:50 +0200
csiph-web