ALT-BU-2023-5776-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
BDU:2022-07359
Уязвимость реализации поддержки WISPR диспетчера соединений Connman, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-07360
Уязвимость компонента gweb диспетчера соединений Connman, связанная с записью за границами выделенного диапазона памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-03868
Уязвимость компонента client.c диспетчера соединений ConnMan, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-32292
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
Modified: 2024-11-21
CVE-2022-32293
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
- https://bugzilla.suse.com/show_bug.cgi?id=1200190
- https://bugzilla.suse.com/show_bug.cgi?id=1200190
- https://lore.kernel.org/connman/20220801080043.4861-1-wagi%40monom.org/
- https://lore.kernel.org/connman/20220801080043.4861-1-wagi%40monom.org/
- https://lore.kernel.org/connman/20220801080043.4861-3-wagi%40monom.org/
- https://lore.kernel.org/connman/20220801080043.4861-3-wagi%40monom.org/
- GLSA-202310-21
- GLSA-202310-21
- DSA-5231
- DSA-5231
Modified: 2025-02-08
CVE-2023-28488
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
- https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
- https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
- https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138
- https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138
- [debian-lts-announce] 20230421 [SECURITY] [DLA 3397-1] connman security update
- [debian-lts-announce] 20230421 [SECURITY] [DLA 3397-1] connman security update
- DSA-5416
- DSA-5416
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-26491
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
- https://developer.pidgin.im/wiki/FullChangeLog
- https://developer.pidgin.im/wiki/FullChangeLog
- https://github.com/xsf/xeps/pull/1158
- https://github.com/xsf/xeps/pull/1158
- https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc
- https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc
- [debian-lts-announce] 20220606 [SECURITY] [DLA 3043-1] pidgin security update
- [debian-lts-announce] 20220606 [SECURITY] [DLA 3043-1] pidgin security update
- https://mail.jabber.org/pipermail/standards/2022-February/038759.html
- https://mail.jabber.org/pipermail/standards/2022-February/038759.html
- https://pidgin.im/about/security/advisories/cve-2022-26491/
- https://pidgin.im/about/security/advisories/cve-2022-26491/