ALT-PU-2023-5774-1
Closed vulnerabilities
BDU:2022-07359
Уязвимость реализации поддержки WISPR диспетчера соединений Connman, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-07360
Уязвимость компонента gweb диспетчера соединений Connman, связанная с записью за границами выделенного диапазона памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-03868
Уязвимость компонента client.c диспетчера соединений ConnMan, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-32292
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
- https://bugzilla.suse.com/show_bug.cgi?id=1200189
- https://lore.kernel.org/connman/20220801080043.4861-5-wagi%40monom.org/
- https://security.gentoo.org/glsa/202310-21
- https://www.debian.org/security/2022/dsa-5231
- https://bugzilla.suse.com/show_bug.cgi?id=1200189
- https://lore.kernel.org/connman/20220801080043.4861-5-wagi%40monom.org/
- https://security.gentoo.org/glsa/202310-21
- https://www.debian.org/security/2022/dsa-5231
Modified: 2024-11-21
CVE-2022-32293
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
- https://bugzilla.suse.com/show_bug.cgi?id=1200190
- https://lore.kernel.org/connman/20220801080043.4861-1-wagi%40monom.org/
- https://lore.kernel.org/connman/20220801080043.4861-3-wagi%40monom.org/
- https://security.gentoo.org/glsa/202310-21
- https://www.debian.org/security/2022/dsa-5231
- https://bugzilla.suse.com/show_bug.cgi?id=1200190
- https://lore.kernel.org/connman/20220801080043.4861-1-wagi%40monom.org/
- https://lore.kernel.org/connman/20220801080043.4861-3-wagi%40monom.org/
- https://security.gentoo.org/glsa/202310-21
- https://www.debian.org/security/2022/dsa-5231
Modified: 2025-02-08
CVE-2023-28488
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
- https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
- https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138
- https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html
- https://www.debian.org/security/2023/dsa-5416
- https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
- https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138
- https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html
- https://www.debian.org/security/2023/dsa-5416