connman

Link package | bugs open | bugs closed | Wiki | GitHub | web search
Description Intel's modular network connection manager
Version 1.43-1 [extra]

Open

Group Affected Fixed Severity Status Ticket
AVG-2818 1.41-1 Unknown Unknown
Issue Group Severity Remote Type Description
CVE-2022-32293 AVG-2818 Unknown Unknown Unknown Unknown
CVE-2022-32292 AVG-2818 Unknown Unknown Unknown Unknown
CVE-2022-23098 AVG-2818 Unknown Unknown Unknown Unknown
CVE-2022-23097 AVG-2818 Unknown Unknown Unknown Unknown
CVE-2022-23096 AVG-2818 Unknown Unknown Unknown Unknown

Resolved

Group Affected Fixed Severity Status Ticket
AVG-2055 1.39-1 1.40-1 High Fixed
AVG-1543 1.38-1 1.39-1 Critical Fixed FS#69583
Issue Group Severity Remote Type Description
CVE-2021-33833 AVG-2055 High Yes Arbitrary code execution
A security issue has been found in the dnsproxy component of connman in releases 1.32 to 1.39. Unpacking of NAME and RDATA/RDLENGTH fields with TYPE A/AAAA...
CVE-2021-26676 AVG-1543 Medium Yes Information disclosure
A security issue was found in connman 1.38. A stack information leak from an uninitialised variable can lead to information disclosure to a remote attacker....
CVE-2021-26675 AVG-1543 Critical Yes Arbitrary code execution
A security issue was found in connman 1.38. A stack buffer overflow can be used to execute code by network adjacent attackers.

Advisories

Date Advisory Group Severity Type
16 Jun 2021 ASA-202106-44 AVG-2055 High arbitrary code execution
12 Feb 2021 ASA-202102-24 AVG-1543 Critical multiple issues