Package "connman"
Name: |
connman
|
Description: |
Intel Connection Manager daemon
|
Latest version: |
1.36-2.3ubuntu0.1 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
universe |
Homepage: |
https://01.org/connman |
Links
Download "connman"
Other versions of "connman" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
connman (1.36-2.3ubuntu0.1) jammy-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds read
- debian/patches/dnsproxy-Simplify-udp_server_event.patch:
Simplify udp_server_event()
- debian/patches/dnsproxy-Validate-input-data-before-using-them.patch:
Validate input data before using them.
- CVE-2022-23096
- CVE-2022-23097
* SECURITY UPDATE: Denial-of-service
- debian/patches/dnsproxy-Avoid-100-busy-loop-in-TCP-server-case.patch:
Avoid 100 % busy loop in TCP server case.
- debian/patches/dnsproxy-Keep-timeout-in-TCP-case-even-after-connect.patch:
Keep timeout in TCP case even after connection is established.
- CVE-2022-23098
* SECURITY UPDATE: Heap-based buffer overflow
- debian/patches/gweb-Fix-OOB-write-in-received_data.patch: Fix OOB
write in received_data().
- CVE-2022-32292
* SECURITY UPDATE: Use-after-free
- debian/patches/wispr-Add-reference-counter-to-portal-context.patch:
Add reference counter to portal context.
- debian/patches/wispr-Update-portal-context-references.patch: Update
portal context references.
- CVE-2022-32293
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2023-28488.patch: Verify and sanitize packet
length first.
- CVE-2023-28488
-- Fabian Toepfer <email address hidden> Thu, 22 Jun 2023 20:46:02 +0200
|
CVE-2022-23096 |
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient He |
CVE-2022-23097 |
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read. |
CVE-2022-23098 |
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received. |
CVE-2022-32292 |
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in receiv |
CVE-2022-32293 |
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading t |
CVE-2023-28488 |
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer |
|
About
-
Send Feedback to @ubuntu_updates