CVE-2022-23096
28.01.2022, 16:15
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.Enginsight
| Vendor | Product | Version |
|---|---|---|
| intel | connman | 𝑥 ≤ 1.40 |
| debian | debian_linux | 9.0 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References