An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
References
Link | Resource |
---|---|
https://github.com/bus1/dbus-broker/compare/v30...v31 | Patch Third Party Advisory |
https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ | Exploit Third Party Advisory |
https://security.gentoo.org/glsa/202305-04 |
Configurations
History
No history.
Information
Published : 2022-07-17 23:15
Updated : 2023-05-03 11:15
NVD link : CVE-2022-31212
Mitre link : CVE-2022-31212
CVE.ORG link : CVE-2022-31212
JSON object : View
Products Affected
dbus-broker_project
- dbus-broker
CWE
CWE-125
Out-of-bounds Read