The dbus_g_proxy_manager_filter function in dbus-gproxy...
High severity
Unreviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Mar 5, 2013
Published to the GitHub Advisory Database
May 5, 2022
Last updated
Feb 1, 2023
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
References