CVE-2021-23556

NameCVE-2021-23556
DescriptionThe package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
guake (PTS)jessie0.4.4-1vulnerable
stretch0.8.8-1vulnerable
buster3.4.0-1vulnerable
bullseye3.6.3-2vulnerable
bookworm3.9.0-2fixed
sid, trixie3.10-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
guakesourcejessie(unfixed)end-of-life
guakesource(unstable)3.8.5-1

Notes

[bullseye] - guake <no-dsa> (Minor issue)
[buster] - guake <no-dsa> (Minor issue)
[stretch] - guake <postponed> (Minor issue, unclear crossed security boundaries, no final fix yet)
https://github.com/Guake/guake/commit/b769b3a5fd71a107c58679d217cccc971b4196b4 (3.8.2)
https://github.com/Guake/guake/issues/1796
https://github.com/Guake/guake/pull/2017
https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334
Regression/reversion: https://github.com/Guake/guake/issues/2042

Search for package or bug name: Reporting problems