First published: Sun Oct 09 2022(Updated: )
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop D-Bus | <1.12.24 | |
Freedesktop D-Bus | >=1.13.0<1.14.4 | |
Freedesktop D-Bus | >=1.15.0<1.15.2 | |
Fedora | =35 | |
Fedora | =36 | |
Fedora | =37 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
dbus | <1.12.24 | |
dbus | >=1.13.0<1.14.4 | |
dbus | >=1.15.0<1.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42011 is a vulnerability in D-Bus that allows an authenticated attacker to crash dbus-daemon and other programs that use libdbus.
The severity of CVE-2022-42011 is medium with a CVSS score of 6.5.
Versions of D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2 are affected by CVE-2022-42011.
An authenticated attacker can exploit CVE-2022-42011 by sending a message where an array length is inconsistent with the size of the element type.
Yes, you can find references for CVE-2022-42011 at the following URLs: [Reference 1](https://gitlab.freedesktop.org/dbus/dbus/-/issues/413), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/).