vulnerability
SUSE: CVE-2022-23096: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jan 11, 2022 | Mar 2, 2022 | Oct 26, 2022 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jan 11, 2022
Added
Mar 2, 2022
Modified
Oct 26, 2022
Description
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Solutions
suse-upgrade-connmansuse-upgrade-connman-clientsuse-upgrade-connman-develsuse-upgrade-connman-docsuse-upgrade-connman-nmcompatsuse-upgrade-connman-plugin-hh2serial-gpssuse-upgrade-connman-plugin-iospmsuse-upgrade-connman-plugin-l2tpsuse-upgrade-connman-plugin-openvpnsuse-upgrade-connman-plugin-polkitsuse-upgrade-connman-plugin-pptpsuse-upgrade-connman-plugin-tistsuse-upgrade-connman-plugin-vpncsuse-upgrade-connman-plugin-wireguardsuse-upgrade-connman-test
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.