An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
References
Link | Resource |
---|---|
https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ | Exploit Third Party Advisory |
https://github.com/bus1/dbus-broker/compare/v30...v31 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-07-17 16:15
Updated : 2022-07-25 15:07
NVD link : CVE-2022-31212
Mitre link : CVE-2022-31212
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
dbus-broker_project
- dbus-broker