Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-26675
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.540Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { name: "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { name: "DSA-4847", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2021/dsa-4847", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://kunnamon.io/tbone/", }, { name: "GLSA-202107-29", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202107-29", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-12T04:06:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { tags: [ "x_refsource_MISC", ], url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { name: "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { name: "DSA-4847", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2021/dsa-4847", }, { tags: [ "x_refsource_MISC", ], url: "https://kunnamon.io/tbone/", }, { name: "GLSA-202107-29", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202107-29", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-26675", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", refsource: "MISC", url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", refsource: "CONFIRM", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { name: "https://www.openwall.com/lists/oss-security/2021/02/08/2", refsource: "MISC", url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", refsource: "CONFIRM", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { name: "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { name: "DSA-4847", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4847", }, { name: "https://kunnamon.io/tbone/", refsource: "MISC", url: "https://kunnamon.io/tbone/", }, { name: "GLSA-202107-29", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202107-29", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-26675", datePublished: "2021-02-09T15:47:25", dateReserved: "2021-02-03T00:00:00", dateUpdated: "2024-08-03T20:26:25.540Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-26675\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-09T16:15:12.453\",\"lastModified\":\"2024-11-21T05:56:39.123\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de búfer en la región stack de la memoria en dnsproxy en ConnMan versiones anteriores a 1.39, podría ser usado por atacantes adyacentes a la red para ejecutar código\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.39\",\"matchCriteriaId\":\"3C6D54B9-DC0E-4300-B554-45AFA532C3CB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1181751\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://kunnamon.io/tbone/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202107-29\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4847\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/02/08/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1181751\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://kunnamon.io/tbone/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202107-29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4847\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/02/08/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}", }, }
ghsa-p5r5-rf4r-f8jm
Vulnerability from github
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
{ affected: [], aliases: [ "CVE-2021-26675", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-02-09T16:15:00Z", severity: "HIGH", }, details: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", id: "GHSA-p5r5-rf4r-f8jm", modified: "2022-05-24T17:41:38Z", published: "2022-05-24T17:41:38Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-26675", }, { type: "WEB", url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { type: "WEB", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { type: "WEB", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { type: "WEB", url: "https://kunnamon.io/tbone", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202107-29", }, { type: "WEB", url: "https://www.debian.org/security/2021/dsa-4847", }, { type: "WEB", url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
opensuse-su-2021:0452-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for connman", title: "Title of the patch", }, { category: "description", text: "This update for connman fixes the following issues:\n\nUpdate to 1.39 (boo#1181751):\n\n* Fix issue with scanning state synchronization and iwd.\n* Fix issue with invalid key with 4-way handshake offloading.\n* Fix issue with DNS proxy length checks to prevent buffer overflow. (CVE-2021-26675)\n* Fix issue with DHCP leaking stack data via uninitialized variable. (CVE-2021-26676)\n\nUpdate to 1.38:\n\n* Fix issue with online check on IP address update.\n* Fix issue with OpenVPN and encrypted private keys.\n* Fix issue with finishing of VPN connections.\n* Add support for updated stable iwd APIs.\n* Add support for WireGuard networks.\n\nUpdate to 1.37:\n\n* Fix issue with handling invalid gateway addresses.\n* Fix issue with handling updates of default gateway.\n* Fix issue with DHCP servers that require broadcast flag.\n* Add support for option to use gateways as time servers.\n* Add support for option to select default technology.\n* Add support for Address Conflict Detection (ACD).\n* Add support for IPv6 iptables management.\n\nChange in 1.36:\n\n* Fix issue with DNS short response on error handling.\n* Fix issue with handling incoming DNS requests.\n* Fix issue with handling empty timeserver list.\n* Fix issue with incorrect DHCP byte order.\n* Fix issue with AllowDomainnameUpdates handling.\n* Fix issue with IPv4 link-local IP conflict error.\n* Fix issue with handling WISPr over TLS connections.\n* Fix issue with WiFi background scanning handling.\n* Fix issue with WiFi disconnect+connect race condition.\n* Fix issue with WiFi scanning and tethering operation.\n* Fix issue with WiFi security change handling.\n* Fix issue with missing signal for WPS changes.\n* Fix issue with online check retry handling.\n* Add support for systemd-resolved backend.\n* Add support for mDNS configuration setup.\n\n\nThis update was imported from the openSUSE:Leap:15.2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-452", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0452-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0452-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6R3XK5JUBLJRIRVG3PVC2DOVU5KBVK/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0452-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6R3XK5JUBLJRIRVG3PVC2DOVU5KBVK/", }, { category: "self", summary: "SUSE Bug 1181751", url: "https://bugzilla.suse.com/1181751", }, { category: "self", summary: "SUSE CVE CVE-2021-26675 page", url: "https://www.suse.com/security/cve/CVE-2021-26675/", }, { category: "self", summary: "SUSE CVE CVE-2021-26676 page", url: "https://www.suse.com/security/cve/CVE-2021-26676/", }, ], title: "Security update for connman", tracking: { current_release_date: "2021-03-20T13:05:14Z", generator: { date: "2021-03-20T13:05:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0452-1", initial_release_date: "2021-03-20T13:05:14Z", revision_history: [ { date: "2021-03-20T13:05:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "connman-1.39-bp152.4.3.1.x86_64", product: { name: "connman-1.39-bp152.4.3.1.x86_64", product_id: "connman-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-client-1.39-bp152.4.3.1.x86_64", product: { name: "connman-client-1.39-bp152.4.3.1.x86_64", product_id: "connman-client-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-devel-1.39-bp152.4.3.1.x86_64", product: { name: "connman-devel-1.39-bp152.4.3.1.x86_64", product_id: "connman-devel-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-doc-1.39-bp152.4.3.1.x86_64", product: { name: "connman-doc-1.39-bp152.4.3.1.x86_64", product_id: "connman-doc-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-nmcompat-1.39-bp152.4.3.1.x86_64", product: { name: "connman-nmcompat-1.39-bp152.4.3.1.x86_64", product_id: "connman-nmcompat-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-tist-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-tist-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-tist-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", product: { name: "connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", product_id: "connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", }, }, { category: "product_version", name: "connman-test-1.39-bp152.4.3.1.x86_64", product: { name: "connman-test-1.39-bp152.4.3.1.x86_64", product_id: "connman-test-1.39-bp152.4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 15 SP2", product: { name: "SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "connman-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-client-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-devel-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-doc-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-nmcompat-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-tist-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.39-bp152.4.3.1.x86_64 as component of SUSE Package Hub 15 SP2", product_id: "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", }, product_reference: "connman-test-1.39-bp152.4.3.1.x86_64", relates_to_product_reference: "SUSE Package Hub 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-26675", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26675", }, ], notes: [ { category: "general", text: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26675", url: "https://www.suse.com/security/cve/CVE-2021-26675", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26675", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26675", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-20T13:05:14Z", details: "moderate", }, ], title: "CVE-2021-26675", }, { cve: "CVE-2021-26676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26676", }, ], notes: [ { category: "general", text: "gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26676", url: "https://www.suse.com/security/cve/CVE-2021-26676", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26676", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26676", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Package Hub 15 SP2:connman-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-client-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-devel-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-doc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-nmcompat-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-hh2serial-gps-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-iospm-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-l2tp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openconnect-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-openvpn-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-polkit-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-pptp-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-tist-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-vpnc-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-plugin-wireguard-1.39-bp152.4.3.1.x86_64", "SUSE Package Hub 15 SP2:connman-test-1.39-bp152.4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-20T13:05:14Z", details: "moderate", }, ], title: "CVE-2021-26676", }, ], }
opensuse-su-2021:0416-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for connman", title: "Title of the patch", }, { category: "description", text: "This update for connman fixes the following issues:\n\nUpdate to 1.39 (boo#1181751):\n\n* Fix issue with scanning state synchronization and iwd.\n* Fix issue with invalid key with 4-way handshake offloading.\n* Fix issue with DNS proxy length checks to prevent buffer overflow. (CVE-2021-26675)\n* Fix issue with DHCP leaking stack data via uninitialized variable. (CVE-2021-26676)\n\nUpdate to 1.38:\n\n* Fix issue with online check on IP address update.\n* Fix issue with OpenVPN and encrypted private keys.\n* Fix issue with finishing of VPN connections.\n* Add support for updated stable iwd APIs.\n* Add support for WireGuard networks.\n\nUpdate to 1.37:\n\n* Fix issue with handling invalid gateway addresses.\n* Fix issue with handling updates of default gateway.\n* Fix issue with DHCP servers that require broadcast flag.\n* Add support for option to use gateways as time servers.\n* Add support for option to select default technology.\n* Add support for Address Conflict Detection (ACD).\n* Add support for IPv6 iptables management.\n\nChange in 1.36:\n\n* Fix issue with DNS short response on error handling.\n* Fix issue with handling incoming DNS requests.\n* Fix issue with handling empty timeserver list.\n* Fix issue with incorrect DHCP byte order.\n* Fix issue with AllowDomainnameUpdates handling.\n* Fix issue with IPv4 link-local IP conflict error.\n* Fix issue with handling WISPr over TLS connections.\n* Fix issue with WiFi background scanning handling.\n* Fix issue with WiFi disconnect+connect race condition.\n* Fix issue with WiFi scanning and tethering operation.\n* Fix issue with WiFi security change handling.\n* Fix issue with missing signal for WPS changes.\n* Fix issue with online check retry handling.\n* Add support for systemd-resolved backend.\n* Add support for mDNS configuration setup.\n\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-416", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0416-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0416-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTS3LYTIBT7XMBIAK6RCJOKOTPNIEQSF/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0416-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTS3LYTIBT7XMBIAK6RCJOKOTPNIEQSF/", }, { category: "self", summary: "SUSE Bug 1181751", url: "https://bugzilla.suse.com/1181751", }, { category: "self", summary: "SUSE CVE CVE-2021-26675 page", url: "https://www.suse.com/security/cve/CVE-2021-26675/", }, { category: "self", summary: "SUSE CVE CVE-2021-26676 page", url: "https://www.suse.com/security/cve/CVE-2021-26676/", }, ], title: "Security update for connman", tracking: { current_release_date: "2021-03-16T17:06:21Z", generator: { date: "2021-03-16T17:06:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0416-1", initial_release_date: "2021-03-16T17:06:21Z", revision_history: [ { date: "2021-03-16T17:06:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "connman-1.39-lp152.3.3.1.x86_64", product: { name: "connman-1.39-lp152.3.3.1.x86_64", product_id: "connman-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-client-1.39-lp152.3.3.1.x86_64", product: { name: "connman-client-1.39-lp152.3.3.1.x86_64", product_id: "connman-client-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-devel-1.39-lp152.3.3.1.x86_64", product: { name: "connman-devel-1.39-lp152.3.3.1.x86_64", product_id: "connman-devel-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-doc-1.39-lp152.3.3.1.x86_64", product: { name: "connman-doc-1.39-lp152.3.3.1.x86_64", product_id: "connman-doc-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-nmcompat-1.39-lp152.3.3.1.x86_64", product: { name: "connman-nmcompat-1.39-lp152.3.3.1.x86_64", product_id: "connman-nmcompat-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-tist-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-tist-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-tist-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", product: { name: "connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", product_id: "connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", }, }, { category: "product_version", name: "connman-test-1.39-lp152.3.3.1.x86_64", product: { name: "connman-test-1.39-lp152.3.3.1.x86_64", product_id: "connman-test-1.39-lp152.3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "connman-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-client-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-devel-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-doc-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-nmcompat-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-tist-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.39-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", }, product_reference: "connman-test-1.39-lp152.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-26675", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26675", }, ], notes: [ { category: "general", text: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26675", url: "https://www.suse.com/security/cve/CVE-2021-26675", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26675", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26675", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-16T17:06:21Z", details: "moderate", }, ], title: "CVE-2021-26675", }, { cve: "CVE-2021-26676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26676", }, ], notes: [ { category: "general", text: "gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26676", url: "https://www.suse.com/security/cve/CVE-2021-26676", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26676", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26676", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:connman-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-client-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-devel-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-doc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-nmcompat-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-hh2serial-gps-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-iospm-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-l2tp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openconnect-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-openvpn-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-polkit-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-pptp-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-tist-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-vpnc-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-plugin-wireguard-1.39-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:connman-test-1.39-lp152.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-16T17:06:21Z", details: "moderate", }, ], title: "CVE-2021-26676", }, ], }
opensuse-su-2024:10692-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "connman-1.40-2.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the connman-1.40-2.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10692", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10692-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-12865 page", url: "https://www.suse.com/security/cve/CVE-2017-12865/", }, { category: "self", summary: "SUSE CVE CVE-2021-26675 page", url: "https://www.suse.com/security/cve/CVE-2021-26675/", }, { category: "self", summary: "SUSE CVE CVE-2021-26676 page", url: "https://www.suse.com/security/cve/CVE-2021-26676/", }, { category: "self", summary: "SUSE CVE CVE-2021-33833 page", url: "https://www.suse.com/security/cve/CVE-2021-33833/", }, ], title: "connman-1.40-2.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10692-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "connman-1.40-2.2.aarch64", product: { name: "connman-1.40-2.2.aarch64", product_id: "connman-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-client-1.40-2.2.aarch64", product: { name: "connman-client-1.40-2.2.aarch64", product_id: "connman-client-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-devel-1.40-2.2.aarch64", product: { name: "connman-devel-1.40-2.2.aarch64", product_id: "connman-devel-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-doc-1.40-2.2.aarch64", product: { name: "connman-doc-1.40-2.2.aarch64", product_id: "connman-doc-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-nmcompat-1.40-2.2.aarch64", product: { name: "connman-nmcompat-1.40-2.2.aarch64", product_id: "connman-nmcompat-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", product: { name: "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", product_id: "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-iospm-1.40-2.2.aarch64", product: { name: "connman-plugin-iospm-1.40-2.2.aarch64", product_id: "connman-plugin-iospm-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.40-2.2.aarch64", product: { name: "connman-plugin-l2tp-1.40-2.2.aarch64", product_id: "connman-plugin-l2tp-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.40-2.2.aarch64", product: { name: "connman-plugin-openconnect-1.40-2.2.aarch64", product_id: "connman-plugin-openconnect-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.40-2.2.aarch64", product: { name: "connman-plugin-openvpn-1.40-2.2.aarch64", product_id: "connman-plugin-openvpn-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-polkit-1.40-2.2.aarch64", product: { name: "connman-plugin-polkit-1.40-2.2.aarch64", product_id: "connman-plugin-polkit-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-pptp-1.40-2.2.aarch64", product: { name: "connman-plugin-pptp-1.40-2.2.aarch64", product_id: "connman-plugin-pptp-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-tist-1.40-2.2.aarch64", product: { name: "connman-plugin-tist-1.40-2.2.aarch64", product_id: "connman-plugin-tist-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.40-2.2.aarch64", product: { name: "connman-plugin-vpnc-1.40-2.2.aarch64", product_id: "connman-plugin-vpnc-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.40-2.2.aarch64", product: { name: "connman-plugin-wireguard-1.40-2.2.aarch64", product_id: "connman-plugin-wireguard-1.40-2.2.aarch64", }, }, { category: "product_version", name: "connman-test-1.40-2.2.aarch64", product: { name: "connman-test-1.40-2.2.aarch64", product_id: "connman-test-1.40-2.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "connman-1.40-2.2.ppc64le", product: { name: "connman-1.40-2.2.ppc64le", product_id: "connman-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-client-1.40-2.2.ppc64le", product: { name: "connman-client-1.40-2.2.ppc64le", product_id: "connman-client-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-devel-1.40-2.2.ppc64le", product: { name: "connman-devel-1.40-2.2.ppc64le", product_id: "connman-devel-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-doc-1.40-2.2.ppc64le", product: { name: "connman-doc-1.40-2.2.ppc64le", product_id: "connman-doc-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-nmcompat-1.40-2.2.ppc64le", product: { name: "connman-nmcompat-1.40-2.2.ppc64le", product_id: "connman-nmcompat-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", product: { name: "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", product_id: "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-iospm-1.40-2.2.ppc64le", product: { name: "connman-plugin-iospm-1.40-2.2.ppc64le", product_id: "connman-plugin-iospm-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.40-2.2.ppc64le", product: { name: "connman-plugin-l2tp-1.40-2.2.ppc64le", product_id: "connman-plugin-l2tp-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.40-2.2.ppc64le", product: { name: "connman-plugin-openconnect-1.40-2.2.ppc64le", product_id: "connman-plugin-openconnect-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.40-2.2.ppc64le", product: { name: "connman-plugin-openvpn-1.40-2.2.ppc64le", product_id: "connman-plugin-openvpn-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-polkit-1.40-2.2.ppc64le", product: { name: "connman-plugin-polkit-1.40-2.2.ppc64le", product_id: "connman-plugin-polkit-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-pptp-1.40-2.2.ppc64le", product: { name: "connman-plugin-pptp-1.40-2.2.ppc64le", product_id: "connman-plugin-pptp-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-tist-1.40-2.2.ppc64le", product: { name: "connman-plugin-tist-1.40-2.2.ppc64le", product_id: "connman-plugin-tist-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.40-2.2.ppc64le", product: { name: "connman-plugin-vpnc-1.40-2.2.ppc64le", product_id: "connman-plugin-vpnc-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.40-2.2.ppc64le", product: { name: "connman-plugin-wireguard-1.40-2.2.ppc64le", product_id: "connman-plugin-wireguard-1.40-2.2.ppc64le", }, }, { category: "product_version", name: "connman-test-1.40-2.2.ppc64le", product: { name: "connman-test-1.40-2.2.ppc64le", product_id: "connman-test-1.40-2.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "connman-1.40-2.2.s390x", product: { name: "connman-1.40-2.2.s390x", product_id: "connman-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-client-1.40-2.2.s390x", product: { name: "connman-client-1.40-2.2.s390x", product_id: "connman-client-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-devel-1.40-2.2.s390x", product: { name: "connman-devel-1.40-2.2.s390x", product_id: "connman-devel-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-doc-1.40-2.2.s390x", product: { name: "connman-doc-1.40-2.2.s390x", product_id: "connman-doc-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-nmcompat-1.40-2.2.s390x", product: { name: "connman-nmcompat-1.40-2.2.s390x", product_id: "connman-nmcompat-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.40-2.2.s390x", product: { name: "connman-plugin-hh2serial-gps-1.40-2.2.s390x", product_id: "connman-plugin-hh2serial-gps-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-iospm-1.40-2.2.s390x", product: { name: "connman-plugin-iospm-1.40-2.2.s390x", product_id: "connman-plugin-iospm-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.40-2.2.s390x", product: { name: "connman-plugin-l2tp-1.40-2.2.s390x", product_id: "connman-plugin-l2tp-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.40-2.2.s390x", product: { name: "connman-plugin-openconnect-1.40-2.2.s390x", product_id: "connman-plugin-openconnect-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.40-2.2.s390x", product: { name: "connman-plugin-openvpn-1.40-2.2.s390x", product_id: "connman-plugin-openvpn-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-polkit-1.40-2.2.s390x", product: { name: "connman-plugin-polkit-1.40-2.2.s390x", product_id: "connman-plugin-polkit-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-pptp-1.40-2.2.s390x", product: { name: "connman-plugin-pptp-1.40-2.2.s390x", product_id: "connman-plugin-pptp-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-tist-1.40-2.2.s390x", product: { name: "connman-plugin-tist-1.40-2.2.s390x", product_id: "connman-plugin-tist-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.40-2.2.s390x", product: { name: "connman-plugin-vpnc-1.40-2.2.s390x", product_id: "connman-plugin-vpnc-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.40-2.2.s390x", product: { name: "connman-plugin-wireguard-1.40-2.2.s390x", product_id: "connman-plugin-wireguard-1.40-2.2.s390x", }, }, { category: "product_version", name: "connman-test-1.40-2.2.s390x", product: { name: "connman-test-1.40-2.2.s390x", product_id: "connman-test-1.40-2.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "connman-1.40-2.2.x86_64", product: { name: "connman-1.40-2.2.x86_64", product_id: "connman-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-client-1.40-2.2.x86_64", product: { name: "connman-client-1.40-2.2.x86_64", product_id: "connman-client-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-devel-1.40-2.2.x86_64", product: { name: "connman-devel-1.40-2.2.x86_64", product_id: "connman-devel-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-doc-1.40-2.2.x86_64", product: { name: "connman-doc-1.40-2.2.x86_64", product_id: "connman-doc-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-nmcompat-1.40-2.2.x86_64", product: { name: "connman-nmcompat-1.40-2.2.x86_64", product_id: "connman-nmcompat-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", product: { name: "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", product_id: "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-iospm-1.40-2.2.x86_64", product: { name: "connman-plugin-iospm-1.40-2.2.x86_64", product_id: "connman-plugin-iospm-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-l2tp-1.40-2.2.x86_64", product: { name: "connman-plugin-l2tp-1.40-2.2.x86_64", product_id: "connman-plugin-l2tp-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-openconnect-1.40-2.2.x86_64", product: { name: "connman-plugin-openconnect-1.40-2.2.x86_64", product_id: "connman-plugin-openconnect-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-openvpn-1.40-2.2.x86_64", product: { name: "connman-plugin-openvpn-1.40-2.2.x86_64", product_id: "connman-plugin-openvpn-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-polkit-1.40-2.2.x86_64", product: { name: "connman-plugin-polkit-1.40-2.2.x86_64", product_id: "connman-plugin-polkit-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-pptp-1.40-2.2.x86_64", product: { name: "connman-plugin-pptp-1.40-2.2.x86_64", product_id: "connman-plugin-pptp-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-tist-1.40-2.2.x86_64", product: { name: "connman-plugin-tist-1.40-2.2.x86_64", product_id: "connman-plugin-tist-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-vpnc-1.40-2.2.x86_64", product: { name: "connman-plugin-vpnc-1.40-2.2.x86_64", product_id: "connman-plugin-vpnc-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-plugin-wireguard-1.40-2.2.x86_64", product: { name: "connman-plugin-wireguard-1.40-2.2.x86_64", product_id: "connman-plugin-wireguard-1.40-2.2.x86_64", }, }, { category: "product_version", name: "connman-test-1.40-2.2.x86_64", product: { name: "connman-test-1.40-2.2.x86_64", product_id: "connman-test-1.40-2.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "connman-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", }, product_reference: "connman-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", }, product_reference: "connman-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-1.40-2.2.s390x", }, product_reference: "connman-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", }, product_reference: "connman-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", }, product_reference: "connman-client-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", }, product_reference: "connman-client-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", }, product_reference: "connman-client-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-client-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", }, product_reference: "connman-client-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", }, product_reference: "connman-devel-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", }, product_reference: "connman-devel-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", }, product_reference: "connman-devel-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-devel-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", }, product_reference: "connman-devel-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", }, product_reference: "connman-doc-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", }, product_reference: "connman-doc-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", }, product_reference: "connman-doc-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-doc-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", }, product_reference: "connman-doc-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", }, product_reference: "connman-nmcompat-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", }, product_reference: "connman-nmcompat-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", }, product_reference: "connman-nmcompat-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-nmcompat-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", }, product_reference: "connman-nmcompat-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", }, product_reference: "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", }, product_reference: "connman-plugin-hh2serial-gps-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-hh2serial-gps-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", }, product_reference: "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", }, product_reference: "connman-plugin-iospm-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-iospm-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", }, product_reference: "connman-plugin-iospm-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-iospm-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", }, product_reference: "connman-plugin-iospm-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", }, product_reference: "connman-plugin-l2tp-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-l2tp-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", }, product_reference: "connman-plugin-l2tp-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-l2tp-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", }, product_reference: "connman-plugin-l2tp-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", }, product_reference: "connman-plugin-openconnect-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-openconnect-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", }, product_reference: "connman-plugin-openconnect-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openconnect-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", }, product_reference: "connman-plugin-openconnect-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", }, product_reference: "connman-plugin-openvpn-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-openvpn-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", }, product_reference: "connman-plugin-openvpn-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-openvpn-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", }, product_reference: "connman-plugin-openvpn-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", }, product_reference: "connman-plugin-polkit-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-polkit-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", }, product_reference: "connman-plugin-polkit-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-polkit-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", }, product_reference: "connman-plugin-polkit-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", }, product_reference: "connman-plugin-pptp-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-pptp-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", }, product_reference: "connman-plugin-pptp-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-pptp-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", }, product_reference: "connman-plugin-pptp-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", }, product_reference: "connman-plugin-tist-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-tist-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", }, product_reference: "connman-plugin-tist-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-tist-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", }, product_reference: "connman-plugin-tist-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", }, product_reference: "connman-plugin-vpnc-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-vpnc-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", }, product_reference: "connman-plugin-vpnc-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-vpnc-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", }, product_reference: "connman-plugin-vpnc-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", }, product_reference: "connman-plugin-wireguard-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", }, product_reference: "connman-plugin-wireguard-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", }, product_reference: "connman-plugin-wireguard-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-plugin-wireguard-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", }, product_reference: "connman-plugin-wireguard-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", }, product_reference: "connman-test-1.40-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", }, product_reference: "connman-test-1.40-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.40-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", }, product_reference: "connman-test-1.40-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "connman-test-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", }, product_reference: "connman-test-1.40-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-12865", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12865", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12865", url: "https://www.suse.com/security/cve/CVE-2017-12865", }, { category: "external", summary: "SUSE Bug 1054720 for CVE-2017-12865", url: "https://bugzilla.suse.com/1054720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12865", }, { cve: "CVE-2021-26675", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26675", }, ], notes: [ { category: "general", text: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26675", url: "https://www.suse.com/security/cve/CVE-2021-26675", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26675", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26675", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-26675", }, { cve: "CVE-2021-26676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26676", }, ], notes: [ { category: "general", text: "gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26676", url: "https://www.suse.com/security/cve/CVE-2021-26676", }, { category: "external", summary: "SUSE Bug 1181751 for CVE-2021-26676", url: "https://bugzilla.suse.com/1181751", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-26676", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-26676", }, { cve: "CVE-2021-33833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33833", }, ], notes: [ { category: "general", text: "ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33833", url: "https://www.suse.com/security/cve/CVE-2021-33833", }, { category: "external", summary: "SUSE Bug 1186869 for CVE-2021-33833", url: "https://bugzilla.suse.com/1186869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-33833", }, ], }
fkie_cve-2021-26675
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | connman | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | leap | 15.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*", matchCriteriaId: "3C6D54B9-DC0E-4300-B554-45AFA532C3CB", versionEndExcluding: "1.39", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", matchCriteriaId: "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", }, { lang: "es", value: "Un desbordamiento de búfer en la región stack de la memoria en dnsproxy en ConnMan versiones anteriores a 1.39, podría ser usado por atacantes adyacentes a la red para ejecutar código", }, ], id: "CVE-2021-26675", lastModified: "2024-11-21T05:56:39.123", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-02-09T16:15:12.453", references: [ { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://kunnamon.io/tbone/", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202107-29", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4847", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://kunnamon.io/tbone/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202107-29", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4847", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-202102-1243
Vulnerability from variot
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. ConnMan Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202107-29
https://security.gentoo.org/
Severity: Normal Title: ConnMan: Multiple vulnerabilities Date: July 12, 2021 Bugs: #769491, #795084 ID: 202107-29
Synopsis
A buffer overflow in ConnMan might allow remote attacker(s) to execute arbitrary code.
Background
ConnMan provides a daemon for managing Internet connections.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/connman < 1.40 >= 1.40
Description
Multiple vulnerabilities have been discovered in connman. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All ConnMan users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.40"
References
[ 1 ] CVE-2021-26675 https://nvd.nist.gov/vuln/detail/CVE-2021-26675 [ 2 ] CVE-2021-26676 https://nvd.nist.gov/vuln/detail/CVE-2021-26676 [ 3 ] CVE-2021-33833 https://nvd.nist.gov/vuln/detail/CVE-2021-33833
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-29
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
.
For the stable distribution (buster), these problems have been fixed in version 1.36-2.1~deb10u1.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAhl9pfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0ToGg//e9ZijJG7S7wkyc4I+q+1Bn1kPikXh4osJ9wgNSUKdcsIGWpjAvnW+X1H WwT5OI+7BeuAK1uAvGIuDK5s6cPsaa8NUKLsAwgKKcwCJcN74wLKls+3j7vt4nQA ynenKrwYBxxdfq9oUFPIvMhWggZ5a1LFqbgLeXnQc36IGAJSpkCMogJpOIQqc3Ed Xi7I7TKk3l2rxsvNxD+qPaRp+0p81trEcX7M81yhEBpg1q2UeEKLrDWkHxT1+l4N +ZHGT71zS5vq7pUrwWURlcy4mwOvNG0VA7BSu/j2mCAH2iUiRMEYOnZWEZTT9rS0 woDFAtU0Yp/zE6FhnXK0iwPyTfv9lJaOLpf30QnT3rc14t1sGhs460Hzv6XUbgjA Z89M5J+ImESPr3S1P7Tw39giD8LRsuXCqX8Hh3blz8astlrp9G+vmH/oN7U/yo9j uaGuwytV5aJuDDyl6tiMPz4nl537fxawdn95Mm9R67F1glESkEUob8ua2PRJDDCl 5ZPkTRwrIMyf2yS9ggvml2AsJbKUEs7pHxuzSpf9f/0ac5vBSwlXgLiEsq91uDxj TkEoXa/UKXyjDqnp4I/ctiwAopcp51Dvmsi2eiLKKxlS8XHWUZxVTSToqcGbj3OU isUqzGXEpvRgvC7u7oFS7FvSX+rBR0+H4iXq8MwCZvgfLldCyLQ= =5+D+ -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6236-1 July 19, 2023
connman vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in ConnMan.
Software Description: - connman: Intel Connection Manager daemon
Details:
It was discovered that ConnMan could be made to write out of bounds. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-26675, CVE-2021-33833)
It was discovered that ConnMan could be made to leak sensitive information via the gdhcp component. A remote attacker could possibly use this issue to obtain information for further exploitation. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)
It was discovered that ConnMan could be made to read out of bounds. A remote attacker could possibly use this issue to case ConnMan to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23096, CVE-2022-23097)
It was discovered that ConnMan could be made to run into an infinite loop. A remote attacker could possibly use this issue to cause ConnMan to consume resources and to stop operating, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)
It was discovered that ConnMan could be made to write out of bounds via the gweb component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)
It was discovered that ConnMan did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)
It was discovered that ConnMan could be made to write out of bounds via the gdhcp component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-28488)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04: connman 1.41-2ubuntu0.23.04.1
Ubuntu 22.04 LTS: connman 1.36-2.3ubuntu0.1
Ubuntu 20.04 LTS: connman 1.36-2ubuntu0.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro): connman 1.35-6ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro): connman 1.21-1.2+deb8u1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6236-1 CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096, CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293, CVE-2023-28488
Package Information: https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1 https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1 https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-1243", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "leap", scope: "eq", trust: 1, vendor: "opensuse", version: "15.2", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "9.0", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "10.0", }, { model: "connman", scope: "lt", trust: 1, vendor: "intel", version: "1.39", }, { model: "leap", scope: null, trust: 0.8, vendor: "opensuse", version: null, }, { model: "gnu/linux", scope: null, trust: 0.8, vendor: "debian", version: null, }, { model: "connman", scope: null, trust: 0.8, vendor: "connman", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Gentoo", sources: [ { db: "PACKETSTORM", id: "163473", }, ], trust: 0.1, }, cve: "CVE-2021-26675", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, id: "CVE-2021-26675", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.8, vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 6.5, id: "VHN-385824", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:A/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "ADJACENT", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2021-26675", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2021-26675", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2021-26675", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2021-26675", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-202104-975", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202102-745", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-385824", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-385824", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "CNNVD", id: "CNNVD-202104-975", }, { db: "CNNVD", id: "CNNVD-202102-745", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. ConnMan Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202107-29\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ConnMan: Multiple vulnerabilities\n Date: July 12, 2021\n Bugs: #769491, #795084\n ID: 202107-29\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA buffer overflow in ConnMan might allow remote attacker(s) to execute\narbitrary code. \n\nBackground\n==========\n\nConnMan provides a daemon for managing Internet connections. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/connman < 1.40 >= 1.40\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in connman. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll ConnMan users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-misc/connman-1.40\"\n\nReferences\n==========\n\n[ 1 ] CVE-2021-26675\n https://nvd.nist.gov/vuln/detail/CVE-2021-26675\n[ 2 ] CVE-2021-26676\n https://nvd.nist.gov/vuln/detail/CVE-2021-26676\n[ 3 ] CVE-2021-33833\n https://nvd.nist.gov/vuln/detail/CVE-2021-33833\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202107-29\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2021 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n\n. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 1.36-2.1~deb10u1. \n\nWe recommend that you upgrade your connman packages. \n\nFor the detailed security status of connman please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/connman\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAhl9pfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2\nNDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND\nz0ToGg//e9ZijJG7S7wkyc4I+q+1Bn1kPikXh4osJ9wgNSUKdcsIGWpjAvnW+X1H\nWwT5OI+7BeuAK1uAvGIuDK5s6cPsaa8NUKLsAwgKKcwCJcN74wLKls+3j7vt4nQA\nynenKrwYBxxdfq9oUFPIvMhWggZ5a1LFqbgLeXnQc36IGAJSpkCMogJpOIQqc3Ed\nXi7I7TKk3l2rxsvNxD+qPaRp+0p81trEcX7M81yhEBpg1q2UeEKLrDWkHxT1+l4N\n+ZHGT71zS5vq7pUrwWURlcy4mwOvNG0VA7BSu/j2mCAH2iUiRMEYOnZWEZTT9rS0\nwoDFAtU0Yp/zE6FhnXK0iwPyTfv9lJaOLpf30QnT3rc14t1sGhs460Hzv6XUbgjA\nZ89M5J+ImESPr3S1P7Tw39giD8LRsuXCqX8Hh3blz8astlrp9G+vmH/oN7U/yo9j\nuaGuwytV5aJuDDyl6tiMPz4nl537fxawdn95Mm9R67F1glESkEUob8ua2PRJDDCl\n5ZPkTRwrIMyf2yS9ggvml2AsJbKUEs7pHxuzSpf9f/0ac5vBSwlXgLiEsq91uDxj\nTkEoXa/UKXyjDqnp4I/ctiwAopcp51Dvmsi2eiLKKxlS8XHWUZxVTSToqcGbj3OU\nisUqzGXEpvRgvC7u7oFS7FvSX+rBR0+H4iXq8MwCZvgfLldCyLQ=\n=5+D+\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-6236-1\nJuly 19, 2023\n\nconnman vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 23.04\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 16.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in ConnMan. \n\nSoftware Description:\n- connman: Intel Connection Manager daemon\n\nDetails:\n\nIt was discovered that ConnMan could be made to write out of bounds. A\nremote attacker could possibly use this issue to cause ConnMan to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. \n(CVE-2021-26675, CVE-2021-33833)\n\nIt was discovered that ConnMan could be made to leak sensitive information\nvia the gdhcp component. A remote attacker could possibly use this issue\nto obtain information for further exploitation. This issue only affected\nUbuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)\n\nIt was discovered that ConnMan could be made to read out of bounds. A\nremote attacker could possibly use this issue to case ConnMan to crash,\nresulting in a denial of service. This issue only affected Ubuntu 16.04\nLTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. \n(CVE-2022-23096, CVE-2022-23097)\n\nIt was discovered that ConnMan could be made to run into an infinite loop. \nA remote attacker could possibly use this issue to cause ConnMan to\nconsume resources and to stop operating, resulting in a denial of service. \nThis issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04\nLTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)\n\nIt was discovered that ConnMan could be made to write out of bounds via\nthe gweb component. A remote attacker could possibly use this issue to\ncause ConnMan to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu\n18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)\n\nIt was discovered that ConnMan did not properly manage memory under\ncertain circumstances. A remote attacker could possibly use this issue to\ncause ConnMan to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu\n18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)\n\nIt was discovered that ConnMan could be made to write out of bounds via\nthe gdhcp component. A remote attacker could possibly use this issue to\ncause ConnMan to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. (CVE-2023-28488)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 23.04:\n connman 1.41-2ubuntu0.23.04.1\n\nUbuntu 22.04 LTS:\n connman 1.36-2.3ubuntu0.1\n\nUbuntu 20.04 LTS:\n connman 1.36-2ubuntu0.1\n\nUbuntu 18.04 LTS (Available with Ubuntu Pro):\n connman 1.35-6ubuntu0.1~esm1\n\nUbuntu 16.04 LTS (Available with Ubuntu Pro):\n connman 1.21-1.2+deb8u1ubuntu0.1~esm1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6236-1\n CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096,\n CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293,\n CVE-2023-28488\n\nPackage Information:\nhttps://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1\n https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1\n https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1\n\n", sources: [ { db: "NVD", id: "CVE-2021-26675", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "CNNVD", id: "CNNVD-202104-975", }, { db: "VULHUB", id: "VHN-385824", }, { db: "PACKETSTORM", id: "163473", }, { db: "PACKETSTORM", id: "168994", }, { db: "PACKETSTORM", id: "173601", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-26675", trust: 2.8, }, { db: "OPENWALL", id: "OSS-SECURITY/2021/02/08/2", trust: 1.7, }, { db: "PACKETSTORM", id: "163473", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2021-003675", trust: 0.8, }, { db: "CS-HELP", id: "SB2021041363", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202104-975", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2023.4078", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.0511", trust: 0.6, }, { db: "CS-HELP", id: "SB2021071202", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202102-745", trust: 0.6, }, { db: "VULHUB", id: "VHN-385824", trust: 0.1, }, { db: "PACKETSTORM", id: "168994", trust: 0.1, }, { db: "PACKETSTORM", id: "173601", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-385824", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "PACKETSTORM", id: "163473", }, { db: "PACKETSTORM", id: "168994", }, { db: "PACKETSTORM", id: "173601", }, { db: "CNNVD", id: "CNNVD-202104-975", }, { db: "CNNVD", id: "CNNVD-202102-745", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, id: "VAR-202102-1243", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-385824", }, ], trust: 0.01, }, last_update_date: "2024-11-23T21:00:13.112000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "DSA-4847-1 openSUSE projectBugzilla", trust: 0.8, url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { title: "ConnMan Buffer error vulnerability fix", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=142575", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "CNNVD", id: "CNNVD-202102-745", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-787", trust: 1.1, }, { problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-385824", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://security.gentoo.org/glsa/202107-29", }, { trust: 1.7, url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { trust: 1.7, url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/changelog", }, { trust: 1.7, url: "https://www.debian.org/security/2021/dsa-4847", }, { trust: 1.7, url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { trust: 1.7, url: "https://kunnamon.io/tbone/", }, { trust: 1.7, url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { trust: 1.7, url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { trust: 1.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-26675", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021041363", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.4078", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/connman-information-disclosure-34514", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/163473/gentoo-linux-security-advisory-202107-29.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.0511", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021071202", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2021-26676", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-33833", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://security-tracker.debian.org/tracker/connman", }, { trust: 0.1, url: "https://www.debian.org/security/faq", }, { trust: 0.1, url: "https://www.debian.org/security/", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32292", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-28488", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23097", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32293", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6236-1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23098", }, ], sources: [ { db: "VULHUB", id: "VHN-385824", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "PACKETSTORM", id: "163473", }, { db: "PACKETSTORM", id: "168994", }, { db: "PACKETSTORM", id: "173601", }, { db: "CNNVD", id: "CNNVD-202104-975", }, { db: "CNNVD", id: "CNNVD-202102-745", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-385824", }, { db: "JVNDB", id: "JVNDB-2021-003675", }, { db: "PACKETSTORM", id: "163473", }, { db: "PACKETSTORM", id: "168994", }, { db: "PACKETSTORM", id: "173601", }, { db: "CNNVD", id: "CNNVD-202104-975", }, { db: "CNNVD", id: "CNNVD-202102-745", }, { db: "NVD", id: "CVE-2021-26675", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-02-09T00:00:00", db: "VULHUB", id: "VHN-385824", }, { date: "2021-11-01T00:00:00", db: "JVNDB", id: "JVNDB-2021-003675", }, { date: "2021-07-13T15:09:13", db: "PACKETSTORM", id: "163473", }, { date: "2021-02-28T20:12:00", db: "PACKETSTORM", id: "168994", }, { date: "2023-07-19T15:26:27", db: "PACKETSTORM", id: "173601", }, { date: "2021-04-13T00:00:00", db: "CNNVD", id: "CNNVD-202104-975", }, { date: "2021-02-09T00:00:00", db: "CNNVD", id: "CNNVD-202102-745", }, { date: "2021-02-09T16:15:12.453000", db: "NVD", id: "CVE-2021-26675", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-05-23T00:00:00", db: "VULHUB", id: "VHN-385824", }, { date: "2021-11-01T09:04:00", db: "JVNDB", id: "JVNDB-2021-003675", }, { date: "2021-04-14T00:00:00", db: "CNNVD", id: "CNNVD-202104-975", }, { date: "2023-07-20T00:00:00", db: "CNNVD", id: "CNNVD-202102-745", }, { date: "2024-11-21T05:56:39.123000", db: "NVD", id: "CVE-2021-26675", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-202102-745", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "ConnMan Out-of-bounds Vulnerability in Microsoft", sources: [ { db: "JVNDB", id: "JVNDB-2021-003675", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202104-975", }, ], trust: 0.6, }, }
gsd-2021-26675
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-26675", description: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", id: "GSD-2021-26675", references: [ "https://www.suse.com/security/cve/CVE-2021-26675.html", "https://www.debian.org/security/2021/dsa-4847", "https://advisories.mageia.org/CVE-2021-26675.html", "https://security.archlinux.org/CVE-2021-26675", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-26675", ], details: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", id: "GSD-2021-26675", modified: "2023-12-13T01:23:33.825901Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-26675", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", refsource: "MISC", url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", refsource: "CONFIRM", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { name: "https://www.openwall.com/lists/oss-security/2021/02/08/2", refsource: "MISC", url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", refsource: "CONFIRM", url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { name: "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { name: "DSA-4847", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4847", }, { name: "https://kunnamon.io/tbone/", refsource: "MISC", url: "https://kunnamon.io/tbone/", }, { name: "GLSA-202107-29", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202107-29", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.39", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-26675", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://www.openwall.com/lists/oss-security/2021/02/08/2", refsource: "MISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.openwall.com/lists/oss-security/2021/02/08/2", }, { name: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", refsource: "MISC", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.suse.com/show_bug.cgi?id=1181751", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", refsource: "CONFIRM", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog", }, { name: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb", }, { name: "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html", }, { name: "DSA-4847", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4847", }, { name: "https://kunnamon.io/tbone/", refsource: "MISC", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://kunnamon.io/tbone/", }, { name: "GLSA-202107-29", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202107-29", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, }, }, lastModifiedDate: "2022-05-23T22:00Z", publishedDate: "2021-02-09T16:15Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.