Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-23098

Опубликовано: 28 янв. 2022
Источник: debian

Описание

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
connmanfixed1.36-2.4package

Примечания

  • https://www.openwall.com/lists/oss-security/2022/01/25/1

  • https://lore.kernel.org/connman/20220125090026.5108-1-wagi@monom.org/

  • https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d8708b85c1e8fe25af7803e8a20cf20e7201d8a4

  • https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c34313a196515c80fe78a2862ad78174b985be5

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 4 лет назад

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

CVSS3: 7.5
nvd
около 4 лет назад

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

CVSS3: 7.5
github
почти 4 года назад

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

CVSS3: 7.5
fstec
около 4 лет назад

Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю вызвать отказ в обслуживании