An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2022/10/06/1 | Mailing List Patch Third Party Advisory |
https://gitlab.freedesktop.org/dbus/dbus/-/issues/413 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2022-10-09 17:15
Updated : 2023-01-18 13:20
NVD link : CVE-2022-42011
Mitre link : CVE-2022-42011
JSON object : View
CWE
CWE-129
Improper Validation of Array Index
Products Affected
d-bus_project
- d-bus
fedoraproject
- fedora