DescriptionAn issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
SUSE Security Advisories:
- openSUSE-SU-2022:0056-1, published Tue Jan 11 21:39:26 2022
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Package Hub 15 SP3|| ||Patchnames: |
|openSUSE Leap 15.3|| ||Patchnames: |
SUSE Timeline for this CVECVE page created: Thu Dec 30 13:00:20 2021
CVE page last modified: Mon Oct 30 18:16:30 2023