AI Score
Confidence
High
EPSS
Percentile
50.0%
An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service’s Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
github.com/bus1/dbus-broker/compare/v30...v31
sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
security.gentoo.org/glsa/202305-04