ArchLinux: 201502-10: dbus: denial of service
Summary
Systemd sends back an ActivationFailure D-Bus signal if the activation fails. However, when it receives these signals, dbus-daemon does not verify that the signal actually came from systemd. A malicious local user could send repeated ActivationFailure signals in the hope that it would "win the race" with the genuine signal, causing D-Bus to send back an error to the client that requested activation.
Resolution
Upgrade to 1.8.16-1.
# pacman -Syu "dbus>=1.8.16-1"
The problem has been fixed upstream in version 1.8.16.
References
https://lists.freedesktop.org/archives/dbus/2015-February/016553.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
Workaround
None.