Vulnerability CVE-2022-32292: Information

Description

In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.

Severity: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: Aug. 3, 2022
Modified: Dec. 21, 2023
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
connmansisyphus1.42-alt11.42-alt1ALT-PU-2023-4820-2326443Fixed
connmansisyphus_e2k1.42-alt11.42-alt1ALT-PU-2023-7996-1-Fixed
connmanp101.42-alt11.42-alt1ALT-PU-2023-5427-3328628Fixed
connmanp10_e2k1.42-alt11.42-alt1ALT-PU-2023-5774-1-Fixed
connmanc10f11.42-alt11.42-alt1ALT-PU-2024-3980-2342713Fixed
connmanp111.42-alt11.42-alt1ALT-PU-2023-4820-2326443Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.suse.com/show_bug.cgi?id=1200189
  • Issue Tracking
  • Third Party Advisory
DSA-5231
  • Third Party Advisory
GLSA-202310-21
  • Third Party Advisory
https://lore.kernel.org/connman/20220801080043.4861-5-wagi%40monom.org/
  • Patch
    1. Configuration 1

      cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*
      End including
      1.41

      Configuration 2

      cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*