Upstream information
CVE-2021-26676 at MITRE
Description
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v2 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  3.3 | 
| Vector |  AV:A/AC:L/Au:N/C:P/I:N/A:N | 
| Access Vector |  Adjacent Network | 
| Access Complexity |  Low | 
| Authentication |  None | 
| Confidentiality Impact |  Partial | 
| Integrity Impact |  None | 
| Availability Impact |  None | 
CVSS v3 Scores
| CVSS detail |  National Vulnerability Database | 
| Base Score |  6.5 | 
| Vector |  CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 
| Attack Vector |  Adjacent Network | 
| Attack Complexity |  Low | 
| Privileges Required |  None | 
| User Interaction |  None | 
| Scope |  Unchanged | 
| Confidentiality Impact |  High | 
| Integrity Impact |  None | 
| Availability Impact |  None | 
| CVSSv3 Version |  3.1 | 
SUSE Bugzilla entries: 
1181751 [RESOLVED / FIXED], 
1186869 [RESOLVED / FIXED]
SUSE Security Advisories:
List of released packages
| Product(s) |  Fixed package version(s) |  References | 
| SUSE Package Hub 15 SP2 |  connman >= 1.39-bp152.4.3.1 
 connman-client >= 1.39-bp152.4.3.1 
 connman-devel >= 1.39-bp152.4.3.1 
 connman-doc >= 1.39-bp152.4.3.1 
 connman-nmcompat >= 1.39-bp152.4.3.1 
 connman-plugin-hh2serial-gps >= 1.39-bp152.4.3.1 
 connman-plugin-iospm >= 1.39-bp152.4.3.1 
 connman-plugin-l2tp >= 1.39-bp152.4.3.1 
 connman-plugin-openconnect >= 1.39-bp152.4.3.1 
 connman-plugin-openvpn >= 1.39-bp152.4.3.1 
 connman-plugin-polkit >= 1.39-bp152.4.3.1 
 connman-plugin-pptp >= 1.39-bp152.4.3.1 
 connman-plugin-tist >= 1.39-bp152.4.3.1 
 connman-plugin-vpnc >= 1.39-bp152.4.3.1 
 connman-plugin-wireguard >= 1.39-bp152.4.3.1 
 connman-test >= 1.39-bp152.4.3.1 
  |  Patchnames:  openSUSE-2021-452 | 
| openSUSE Leap 15.2 |  connman >= 1.39-lp152.3.3.1 
 connman-client >= 1.39-lp152.3.3.1 
 connman-devel >= 1.39-lp152.3.3.1 
 connman-doc >= 1.39-lp152.3.3.1 
 connman-nmcompat >= 1.39-lp152.3.3.1 
 connman-plugin-hh2serial-gps >= 1.39-lp152.3.3.1 
 connman-plugin-iospm >= 1.39-lp152.3.3.1 
 connman-plugin-l2tp >= 1.39-lp152.3.3.1 
 connman-plugin-openconnect >= 1.39-lp152.3.3.1 
 connman-plugin-openvpn >= 1.39-lp152.3.3.1 
 connman-plugin-polkit >= 1.39-lp152.3.3.1 
 connman-plugin-pptp >= 1.39-lp152.3.3.1 
 connman-plugin-tist >= 1.39-lp152.3.3.1 
 connman-plugin-vpnc >= 1.39-lp152.3.3.1 
 connman-plugin-wireguard >= 1.39-lp152.3.3.1 
 connman-test >= 1.39-lp152.3.3.1 
  |  Patchnames:  openSUSE-2021-416 | 
| openSUSE Tumbleweed |  connman >= 1.40-2.2 
 connman-client >= 1.40-2.2 
 connman-devel >= 1.40-2.2 
 connman-doc >= 1.40-2.2 
 connman-nmcompat >= 1.40-2.2 
 connman-plugin-hh2serial-gps >= 1.40-2.2 
 connman-plugin-iospm >= 1.40-2.2 
 connman-plugin-l2tp >= 1.40-2.2 
 connman-plugin-openconnect >= 1.40-2.2 
 connman-plugin-openvpn >= 1.40-2.2 
 connman-plugin-polkit >= 1.40-2.2 
 connman-plugin-pptp >= 1.40-2.2 
 connman-plugin-tist >= 1.40-2.2 
 connman-plugin-vpnc >= 1.40-2.2 
 connman-plugin-wireguard >= 1.40-2.2 
 connman-test >= 1.40-2.2 
  |  Patchnames:  openSUSE-Tumbleweed-2024-10692 | 
SUSE Timeline for this CVE
CVE page created: Wed Feb  3 17:19:43 2021
CVE page last modified: Sat Nov  1 22:26:31 2025