Search CVE reports


Toggle filters

11 – 20 of 21 results


CVE-2022-23098

Medium priority

Some fixes available 4 of 5

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Fixed Fixed Fixed
Show less packages

CVE-2022-23097

Medium priority

Some fixes available 4 of 5

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Fixed Fixed Fixed
Show less packages

CVE-2022-23096

Medium priority

Some fixes available 4 of 5

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Fixed Fixed Fixed
Show less packages

CVE-2021-33833

Medium priority

Some fixes available 2 of 5

ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Not affected Fixed Fixed
Show less packages

CVE-2021-26676

Medium priority

Some fixes available 3 of 6

gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Not affected Fixed Fixed
Show less packages

CVE-2021-26675

Medium priority

Some fixes available 2 of 5

A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Not affected Fixed Fixed
Show less packages

CVE-2017-5716

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-12865. Reason: This candidate is a reservation duplicate of CVE-2017-12865. Notes: All CVE users should reference CVE-2017-12865 instead of this candidate....

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman
Show less packages

CVE-2017-12865

Medium priority

Some fixes available 1 of 2

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman Not affected
Show less packages

CVE-2012-2322

Medium priority
Ignored

Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman
Show less packages

CVE-2012-2321

Medium priority
Ignored

The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.

1 affected package

connman

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
connman
Show less packages