CVE-2022-31212

An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dbus-broker_project:dbus-broker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://github.com/bus1/dbus-broker/compare/v30...v31 - Patch, Third Party Advisory () https://github.com/bus1/dbus-broker/compare/v30...v31 - Patch, Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/ - Exploit, Third Party Advisory
References () https://security.gentoo.org/glsa/202305-04 - () https://security.gentoo.org/glsa/202305-04 -

Information

Published : 2022-07-17 23:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31212

Mitre link : CVE-2022-31212

CVE.ORG link : CVE-2022-31212


JSON object : View

Products Affected

dbus-broker_project

  • dbus-broker
CWE
CWE-125

Out-of-bounds Read