Описание
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 1.41-3 |
| esm-apps/bionic | released | 1.35-6ubuntu0.1~esm1 |
| esm-apps/focal | released | 1.36-2ubuntu0.1 |
| esm-apps/jammy | released | 1.36-2.3ubuntu0.1 |
| esm-apps/xenial | released | 1.21-1.2+deb8u1ubuntu0.1~esm1 |
| focal | released | 1.36-2ubuntu0.1 |
| impish | ignored | end of life |
| jammy | released | 1.36-2.3ubuntu0.1 |
| kinetic | not-affected | 1.41-2 |
Показывать по
EPSS
6.4 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
An issue was discovered in the DNS proxy in Connman through 1.40. The ...
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию
EPSS
6.4 Medium
CVSS2
9.1 Critical
CVSS3