First published: Sun Oct 09 2022(Updated: )
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-bus Project D-bus | <1.12.24 | |
D-bus Project D-bus | >=1.13.0<1.14.4 | |
D-bus Project D-bus | >=1.15.0<1.15.2 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Freedesktop Dbus | <1.12.24 | |
Freedesktop Dbus | >=1.13.0<1.14.4 | |
Freedesktop Dbus | >=1.15.0<1.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42010 is a vulnerability in D-Bus that allows an authenticated attacker to crash dbus-daemon and other programs using libdbus by sending a message with certain invalid type signatures.
The severity of CVE-2022-42010 is medium with a CVSS score of 6.5.
D-Bus versions before 1.12.24, between 1.13.0 and 1.14.4, and between 1.15.0 and 1.15.2 are affected. Fedora versions 35, 36, and 37 are also affected.
An attacker with authentication can exploit CVE-2022-42010 by sending a specially crafted message with invalid type signatures to dbus-daemon or other programs using libdbus, causing them to crash.
Yes, upgrading to D-Bus version 1.12.24, 1.14.4, or 1.15.2 and updating Fedora to a version higher than 37 will fix the vulnerability.