Search CVE reports
11 – 18 of 18 results
CVE-2022-23096
Medium prioritySome fixes available 4 of 5
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-33833
Medium prioritySome fixes available 2 of 5
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | Not affected | Fixed | Fixed | Not affected |
CVE-2021-26676
Medium prioritySome fixes available 3 of 6
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | Not affected | Fixed | Fixed | Fixed |
CVE-2021-26675
Medium prioritySome fixes available 2 of 5
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | Not affected | Fixed | Fixed | Not affected |
CVE-2017-12865
Medium prioritySome fixes available 1 of 2
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | — | — | Not affected | Fixed |
CVE-2012-2322
Medium priorityInteger overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | — | — | — | Not affected |
CVE-2012-2321
Medium priorityThe loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | — | — | — | Not affected |
CVE-2012-2320
Medium priorityConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
1 affected packages
connman
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
connman | — | — | — | — | Not affected |