Multiple vulnerabilities in version 29(stable). Fixed in version 31, which is still unstable. Reproducible: Always Actual Results: Vulnerability overview/description: ----------------------------------- 1) Stack-Buffer Over-Read (CVE-2022-31212) Dbus-Broker depends on c-uitl/c-shquote to parse DBus service's Exec line. c-shquote contains a stack buffer over-read if a malicious Exec line is supplied. 2) Null Pointer Dereference (CVE-2022-31213) Multiple Null Pointer references can be found when supplying a malformed XML config file.
Thanks!
Please cleanup
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=7d32d1d523945ea104ab16421f21ae8121c0dce7 commit 7d32d1d523945ea104ab16421f21ae8121c0dce7 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-05-03 09:13:30 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2023-05-03 09:31:46 +0000 [ GLSA 202305-04 ] dbus-broker: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/851696 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Sam James <sam@gentoo.org> glsa-202305-04.xml | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+)