Upstream information
Description
An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 7.5 | 5.4 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | Required |
Scope | Unchanged | Unchanged |
Confidentiality Impact | None | Low |
Integrity Impact | None | None |
Availability Impact | High | Low |
CVSSv3 Version | 3.1 | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2022:10030-1, published Sat Jun 25 23:38:43 2022
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Liberty Linux 9 |
| Patchnames: RHSA-2022:6608 |
SUSE Package Hub 15 SP4 |
| Patchnames: openSUSE-2022-10030 |
openSUSE Leap 15.4 |
| Patchnames: openSUSE-2022-10030 |
SUSE Timeline for this CVE
CVE page created: Wed Jun 8 12:01:50 2022CVE page last modified: Mon Oct 30 18:17:06 2023