Upstream information
CVE-2023-28488 at MITRE
Description
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v3 Scores
| CVSS detail | CNA (CISA-ADP) | National Vulnerability Database | 
|---|
| Base Score | 6.5 | 6.5 | 
| Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 
| Attack Vector | Adjacent Network | Adjacent Network | 
| Attack Complexity | Low | Low | 
| Privileges Required | None | None | 
| User Interaction | None | None | 
| Scope | Unchanged | Unchanged | 
| Confidentiality Impact | None | None | 
| Integrity Impact | None | None | 
| Availability Impact | High | High | 
| CVSSv3 Version | 3.1 | 3.1 | 
SUSE Bugzilla entry: 
1210395 [NEW]
SUSE Security Advisories:
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|
| SUSE Package Hub 15 SP4 | connman >= 1.42-bp154.2.6.1connman-client >= 1.42-bp154.2.6.1connman-devel >= 1.42-bp154.2.6.1connman-doc >= 1.42-bp154.2.6.1connman-nmcompat >= 1.42-bp154.2.6.1connman-plugin-hh2serial-gps >= 1.42-bp154.2.6.1connman-plugin-iospm >= 1.42-bp154.2.6.1connman-plugin-l2tp >= 1.42-bp154.2.6.1connman-plugin-openvpn >= 1.42-bp154.2.6.1connman-plugin-polkit >= 1.42-bp154.2.6.1connman-plugin-pptp >= 1.42-bp154.2.6.1connman-plugin-tist >= 1.42-bp154.2.6.1connman-plugin-vpnc >= 1.42-bp154.2.6.1connman-plugin-wireguard >= 1.42-bp154.2.6.1connman-test >= 1.42-bp154.2.6.1
 | Patchnames: openSUSE-2023-370
 | 
| SUSE Package Hub 15 SP5 | connman >= 1.42-bp155.4.3.1connman-client >= 1.42-bp155.4.3.1connman-devel >= 1.42-bp155.4.3.1connman-doc >= 1.42-bp155.4.3.1connman-nmcompat >= 1.42-bp155.4.3.1connman-plugin-hh2serial-gps >= 1.42-bp155.4.3.1connman-plugin-iospm >= 1.42-bp155.4.3.1connman-plugin-l2tp >= 1.42-bp155.4.3.1connman-plugin-openvpn >= 1.42-bp155.4.3.1connman-plugin-polkit >= 1.42-bp155.4.3.1connman-plugin-pptp >= 1.42-bp155.4.3.1connman-plugin-tist >= 1.42-bp155.4.3.1connman-plugin-vpnc >= 1.42-bp155.4.3.1connman-plugin-wireguard >= 1.42-bp155.4.3.1connman-test >= 1.42-bp155.4.3.1
 | Patchnames: openSUSE-2023-369
 | 
| openSUSE Leap 15.4 | connman >= 1.42-bp154.2.6.1connman-client >= 1.42-bp154.2.6.1connman-devel >= 1.42-bp154.2.6.1connman-doc >= 1.42-bp154.2.6.1connman-nmcompat >= 1.42-bp154.2.6.1connman-plugin-hh2serial-gps >= 1.42-bp154.2.6.1connman-plugin-iospm >= 1.42-bp154.2.6.1connman-plugin-l2tp >= 1.42-bp154.2.6.1connman-plugin-openvpn >= 1.42-bp154.2.6.1connman-plugin-polkit >= 1.42-bp154.2.6.1connman-plugin-pptp >= 1.42-bp154.2.6.1connman-plugin-tist >= 1.42-bp154.2.6.1connman-plugin-vpnc >= 1.42-bp154.2.6.1connman-plugin-wireguard >= 1.42-bp154.2.6.1connman-test >= 1.42-bp154.2.6.1
 | Patchnames: openSUSE-2023-370
 | 
| openSUSE Leap 15.5 | connman >= 1.42-bp155.4.3.1connman-client >= 1.42-bp155.4.3.1connman-devel >= 1.42-bp155.4.3.1connman-doc >= 1.42-bp155.4.3.1connman-nmcompat >= 1.42-bp155.4.3.1connman-plugin-hh2serial-gps >= 1.42-bp155.4.3.1connman-plugin-iospm >= 1.42-bp155.4.3.1connman-plugin-l2tp >= 1.42-bp155.4.3.1connman-plugin-openvpn >= 1.42-bp155.4.3.1connman-plugin-polkit >= 1.42-bp155.4.3.1connman-plugin-pptp >= 1.42-bp155.4.3.1connman-plugin-tist >= 1.42-bp155.4.3.1connman-plugin-vpnc >= 1.42-bp155.4.3.1connman-plugin-wireguard >= 1.42-bp155.4.3.1connman-test >= 1.42-bp155.4.3.1
 | Patchnames: openSUSE-2023-369
 | 
| openSUSE Tumbleweed | connman >= 1.42-1.1connman-client >= 1.42-1.1connman-devel >= 1.42-1.1connman-doc >= 1.42-1.1connman-nmcompat >= 1.42-1.1connman-plugin-hh2serial-gps >= 1.42-1.1connman-plugin-iospm >= 1.42-1.1connman-plugin-l2tp >= 1.42-1.1connman-plugin-openconnect >= 1.42-1.1connman-plugin-openvpn >= 1.42-1.1connman-plugin-polkit >= 1.42-1.1connman-plugin-pptp >= 1.42-1.1connman-plugin-tist >= 1.42-1.1connman-plugin-vpnc >= 1.42-1.1connman-plugin-wireguard >= 1.42-1.1connman-test >= 1.42-1.1
 | Patchnames: openSUSE-Tumbleweed-2024-13420
 | 
SUSE Timeline for this CVE
CVE page created: Wed Apr 12 20:00:58 2023
CVE page last modified: Mon Oct  6 19:46:11 2025