vulnerability
Arch Linux: Out-of-bounds Read (CVE-2022-23096)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jan 28, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jan 28, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Solution
arch-linux-upgrade-latest
References
- CVE-2022-23096
- https://attackerkb.com/topics/CVE-2022-23096
- URL-https://git.kernel.org/pub/scm/network/connman/connman.git/log/
- URL-https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html
- URL-https://security.gentoo.org/glsa/202310-21
- URL-https://www.debian.org/security/2022/dsa-5231
- URL-https://www.openwall.com/lists/oss-security/2022/01/25/1
- CWE-125
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.