{"id":"CVE-2022-31212","details":"An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.","modified":"2026-03-14T11:46:25.553669Z","published":"2022-07-17T23:15:08.977Z","related":["ALSA-2022:6608","openSUSE-SU-2022:10030-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202305-04"},{"type":"FIX","url":"https://github.com/bus1/dbus-broker/compare/v30...v31"},{"type":"EVIDENCE","url":"https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bus1/dbus-broker","events":[{"introduced":"0"},{"fixed":"4944daf06275aaccd2fcdbfea994c3cb7cec65d2"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"31"}]}}],"versions":["v1","v10","v11","v12","v13","v14","v15","v16","v17","v18","v19","v1rc1","v1rc2","v1rc3","v1rc4","v2","v20","v21","v22","v23","v24","v25","v26","v27","v28","v29","v3","v30","v4","v5","v6","v7","v8","v9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31212.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}