vulnerability
SUSE: CVE-2022-32292: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2022-08-03 | 2022-10-26 | 2025-01-28 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2022-08-03
Added
2022-10-26
Modified
2025-01-28
Description
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
Solution(s)
suse-upgrade-connmansuse-upgrade-connman-clientsuse-upgrade-connman-develsuse-upgrade-connman-docsuse-upgrade-connman-nmcompatsuse-upgrade-connman-plugin-hh2serial-gpssuse-upgrade-connman-plugin-iospmsuse-upgrade-connman-plugin-l2tpsuse-upgrade-connman-plugin-openvpnsuse-upgrade-connman-plugin-polkitsuse-upgrade-connman-plugin-pptpsuse-upgrade-connman-plugin-tistsuse-upgrade-connman-plugin-vpncsuse-upgrade-connman-plugin-wireguardsuse-upgrade-connman-test

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.