Описание
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 1.41-3 |
| esm-apps/bionic | released | 1.35-6ubuntu0.1~esm1 |
| esm-apps/focal | released | 1.36-2ubuntu0.1 |
| esm-apps/jammy | released | 1.36-2.3ubuntu0.1 |
| esm-apps/xenial | released | 1.21-1.2+deb8u1ubuntu0.1~esm1 |
| focal | released | 1.36-2ubuntu0.1 |
| jammy | released | 1.36-2.3ubuntu0.1 |
| kinetic | not-affected | 1.41-2 |
| lunar | not-affected | 1.41-2 |
Показывать по
8.1 High
CVSS3
Связанные уязвимости
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HT ...
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
Уязвимость реализации поддержки WISPR диспетчера соединений Connman, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
8.1 High
CVSS3