Upstream information
Description
No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via No Limit on Number of Open Sessions.There is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method. For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.
SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | CNA (Fedora Project) | 
|---|---|
| Base Score | 6.5 | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H | 
| Attack Vector | Local | 
| Attack Complexity | Low | 
| Privileges Required | Low | 
| User Interaction | None | 
| Scope | Changed | 
| Confidentiality Impact | None | 
| Integrity Impact | None | 
| Availability Impact | High | 
| CVSSv3 Version | 3.1 | 
SUSE Timeline for this CVE
CVE page created: Thu Dec 21 23:30:04 2023CVE page last modified: Mon Oct 6 19:51:27 2025