Описание
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 1.41-3 |
| esm-apps/bionic | released | 1.35-6ubuntu0.1~esm1 |
| esm-apps/focal | released | 1.36-2ubuntu0.1 |
| esm-apps/jammy | released | 1.36-2.3ubuntu0.1 |
| esm-apps/xenial | released | 1.21-1.2+deb8u1ubuntu0.1~esm1 |
| focal | released | 1.36-2ubuntu0.1 |
| impish | ignored | end of life |
| jammy | released | 1.36-2.3ubuntu0.1 |
| kinetic | not-affected | 1.41-2 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
An issue was discovered in the DNS proxy in Connman through 1.40. The ...
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3