First published: Sun Oct 09 2022(Updated: )
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-bus Project D-bus | <1.12.24 | |
D-bus Project D-bus | >=1.13.0<1.14.4 | |
D-bus Project D-bus | >=1.15.0<1.15.2 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Freedesktop Dbus | <1.12.24 | |
Freedesktop Dbus | >=1.13.0<1.14.4 | |
Freedesktop Dbus | >=1.15.0<1.15.2 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42011 is a vulnerability in D-Bus that allows an authenticated attacker to crash dbus-daemon and other programs that use libdbus.
The severity of CVE-2022-42011 is medium with a CVSS score of 6.5.
Versions of D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2 are affected by CVE-2022-42011.
An authenticated attacker can exploit CVE-2022-42011 by sending a message where an array length is inconsistent with the size of the element type.
Yes, you can find references for CVE-2022-42011 at the following URLs: [Reference 1](https://gitlab.freedesktop.org/dbus/dbus/-/issues/413), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/).