Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-12865 (GCVE-0-2017-12865)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:51:06.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "name": "GLSA-201812-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201812-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "name": "100498", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100498" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "name": "DSA-3956", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-03T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "name": "GLSA-201812-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201812-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "name": "100498", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100498" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "name": "DSA-3956", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://01.org/security/intel-oss-10001/intel-oss-10001", "refsource": "CONFIRM", "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "name": "GLSA-201812-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201812-02" }, { "name": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando", "refsource": "MISC", "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "name": "100498", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100498" }, { "name": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "name": "DSA-3956", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3956" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12865", "datePublished": "2017-08-29T16:00:00", "dateReserved": "2017-08-15T00:00:00", "dateUpdated": "2024-08-05T18:51:06.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-12865\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-29T16:29:00.217\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in \\\"dnsproxy.c\\\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \\\"name\\\" variable.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer basado en pila en \\\"dnsproxy.c\\\" en connman 1.34 y anteriores permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (bloqueo) o ejecuten c\u00f3digo arbitrario mediante una cadena de consulta de respuesta manipulada pasada a la variable \\\"name\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.34\",\"matchCriteriaId\":\"1919AFA0-4CCB-491B-9364-AD47CD7BB068\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3956\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100498\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://01.org/security/intel-oss-10001/intel-oss-10001\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1483720\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201812-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.nri-secure.com/blog/new-iot-vulnerability-connmando\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3956\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://01.org/security/intel-oss-10001/intel-oss-10001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1483720\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201812-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.nri-secure.com/blog/new-iot-vulnerability-connmando\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-2f42-jv77-x675
Vulnerability from github
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
{ "affected": [], "aliases": [ "CVE-2017-12865" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-08-29T16:29:00Z", "severity": "CRITICAL" }, "details": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable.", "id": "GHSA-2f42-jv77-x675", "modified": "2022-05-13T01:27:59Z", "published": "2022-05-13T01:27:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12865" }, { "type": "WEB", "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201812-02" }, { "type": "WEB", "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3956" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/100498" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cnvd-2017-33718
Vulnerability from cnvd
Title: connman 'src/dnsproxy.c'堆栈缓冲区溢出漏洞
Description:
connman是使用d-bus做为进程间通信机制来管理linux网络链接的一种软件。
connman 'src/dnsproxy.c'存在堆栈缓冲区溢出漏洞。攻击者可以利用漏洞在受影响的应用程序的上下文中执行任意代码。失败的漏洞尝试可能会导致拒绝服务条件。
Severity: 高
Patch Name: connman 'src/dnsproxy.c'堆栈缓冲区溢出漏洞的补丁
Patch Description:
connman是使用d-bus做为进程间通信机制来管理linux网络链接的一种软件。
connman 'src/dnsproxy.c'存在堆栈缓冲区溢出漏洞。攻击者可以利用漏洞在受影响的应用程序的上下文中执行任意代码。失败的漏洞尝试可能会导致拒绝服务条件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下供应商提供的安全公告获得补丁信息: https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71
Reference: http://www.securityfocus.com/bid/100498/
Name | connman connman <=1.34 |
---|
{ "bids": { "bid": { "bidNumber": "100498" } }, "cves": { "cve": { "cveNumber": "CVE-2017-12865" } }, "description": "connman\u662f\u4f7f\u7528d-bus\u505a\u4e3a\u8fdb\u7a0b\u95f4\u901a\u4fe1\u673a\u5236\u6765\u7ba1\u7406linux\u7f51\u7edc\u94fe\u63a5\u7684\u4e00\u79cd\u8f6f\u4ef6\u3002\r\n\r\nconnman \u0027src/dnsproxy.c\u0027\u5b58\u5728\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u5931\u8d25\u7684\u6f0f\u6d1e\u5c1d\u8bd5\u53ef\u80fd\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6761\u4ef6\u3002", "discovererName": "Pedro Sampaio", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-33718", "openTime": "2017-11-13", "patchDescription": "connman\u662f\u4f7f\u7528d-bus\u505a\u4e3a\u8fdb\u7a0b\u95f4\u901a\u4fe1\u673a\u5236\u6765\u7ba1\u7406linux\u7f51\u7edc\u94fe\u63a5\u7684\u4e00\u79cd\u8f6f\u4ef6\u3002\r\n\r\nconnman \u0027src/dnsproxy.c\u0027\u5b58\u5728\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u5931\u8d25\u7684\u6f0f\u6d1e\u5c1d\u8bd5\u53ef\u80fd\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6761\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "connman \u0027src/dnsproxy.c\u0027\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "connman connman \u003c=1.34" }, "referenceLink": "http://www.securityfocus.com/bid/100498/", "serverity": "\u9ad8", "submitTime": "2017-09-14", "title": "connman \u0027src/dnsproxy.c\u0027\u5806\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e" }
gsd-2017-12865
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-12865", "description": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable.", "id": "GSD-2017-12865", "references": [ "https://www.suse.com/security/cve/CVE-2017-12865.html", "https://www.debian.org/security/2017/dsa-3956", "https://advisories.mageia.org/CVE-2017-12865.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-12865" ], "details": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable.", "id": "GSD-2017-12865", "modified": "2023-12-13T01:21:04.115780Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://01.org/security/intel-oss-10001/intel-oss-10001", "refsource": "CONFIRM", "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "name": "GLSA-201812-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201812-02" }, { "name": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando", "refsource": "MISC", "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "name": "100498", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100498" }, { "name": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "name": "DSA-3956", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3956" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.34", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12865" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "name": "100498", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100498" }, { "name": "DSA-3956", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3956" }, { "name": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "name": "https://01.org/security/intel-oss-10001/intel-oss-10001", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "name": "GLSA-201812-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201812-02" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-03-05T19:23Z", "publishedDate": "2017-08-29T16:29Z" } } }
opensuse-su-2024:10692-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "connman-1.40-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the connman-1.40-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10692", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10692-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12865 page", "url": "https://www.suse.com/security/cve/CVE-2017-12865/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26675 page", "url": "https://www.suse.com/security/cve/CVE-2021-26675/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26676 page", "url": "https://www.suse.com/security/cve/CVE-2021-26676/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33833 page", "url": "https://www.suse.com/security/cve/CVE-2021-33833/" } ], "title": "connman-1.40-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10692-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "connman-1.40-2.2.aarch64", "product": { "name": "connman-1.40-2.2.aarch64", "product_id": "connman-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-client-1.40-2.2.aarch64", "product": { "name": "connman-client-1.40-2.2.aarch64", "product_id": "connman-client-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-devel-1.40-2.2.aarch64", "product": { "name": "connman-devel-1.40-2.2.aarch64", "product_id": "connman-devel-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-doc-1.40-2.2.aarch64", "product": { "name": "connman-doc-1.40-2.2.aarch64", "product_id": "connman-doc-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-nmcompat-1.40-2.2.aarch64", "product": { "name": "connman-nmcompat-1.40-2.2.aarch64", "product_id": "connman-nmcompat-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "product": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "product_id": "connman-plugin-hh2serial-gps-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-iospm-1.40-2.2.aarch64", "product": { "name": "connman-plugin-iospm-1.40-2.2.aarch64", "product_id": "connman-plugin-iospm-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-l2tp-1.40-2.2.aarch64", "product": { "name": "connman-plugin-l2tp-1.40-2.2.aarch64", "product_id": "connman-plugin-l2tp-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-openconnect-1.40-2.2.aarch64", "product": { "name": "connman-plugin-openconnect-1.40-2.2.aarch64", "product_id": "connman-plugin-openconnect-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-openvpn-1.40-2.2.aarch64", "product": { "name": "connman-plugin-openvpn-1.40-2.2.aarch64", "product_id": "connman-plugin-openvpn-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-polkit-1.40-2.2.aarch64", "product": { "name": "connman-plugin-polkit-1.40-2.2.aarch64", "product_id": "connman-plugin-polkit-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-pptp-1.40-2.2.aarch64", "product": { "name": "connman-plugin-pptp-1.40-2.2.aarch64", "product_id": "connman-plugin-pptp-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-tist-1.40-2.2.aarch64", "product": { "name": "connman-plugin-tist-1.40-2.2.aarch64", "product_id": "connman-plugin-tist-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-vpnc-1.40-2.2.aarch64", "product": { "name": "connman-plugin-vpnc-1.40-2.2.aarch64", "product_id": "connman-plugin-vpnc-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-plugin-wireguard-1.40-2.2.aarch64", "product": { "name": "connman-plugin-wireguard-1.40-2.2.aarch64", "product_id": "connman-plugin-wireguard-1.40-2.2.aarch64" } }, { "category": "product_version", "name": "connman-test-1.40-2.2.aarch64", "product": { "name": "connman-test-1.40-2.2.aarch64", "product_id": "connman-test-1.40-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "connman-1.40-2.2.ppc64le", "product": { "name": "connman-1.40-2.2.ppc64le", "product_id": "connman-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-client-1.40-2.2.ppc64le", "product": { "name": "connman-client-1.40-2.2.ppc64le", "product_id": "connman-client-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-devel-1.40-2.2.ppc64le", "product": { "name": "connman-devel-1.40-2.2.ppc64le", "product_id": "connman-devel-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-doc-1.40-2.2.ppc64le", "product": { "name": "connman-doc-1.40-2.2.ppc64le", "product_id": "connman-doc-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-nmcompat-1.40-2.2.ppc64le", "product": { "name": "connman-nmcompat-1.40-2.2.ppc64le", "product_id": "connman-nmcompat-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "product_id": "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-iospm-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-iospm-1.40-2.2.ppc64le", "product_id": "connman-plugin-iospm-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-l2tp-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-l2tp-1.40-2.2.ppc64le", "product_id": "connman-plugin-l2tp-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-openconnect-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-openconnect-1.40-2.2.ppc64le", "product_id": "connman-plugin-openconnect-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-openvpn-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-openvpn-1.40-2.2.ppc64le", "product_id": "connman-plugin-openvpn-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-polkit-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-polkit-1.40-2.2.ppc64le", "product_id": "connman-plugin-polkit-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-pptp-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-pptp-1.40-2.2.ppc64le", "product_id": "connman-plugin-pptp-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-tist-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-tist-1.40-2.2.ppc64le", "product_id": "connman-plugin-tist-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-vpnc-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-vpnc-1.40-2.2.ppc64le", "product_id": "connman-plugin-vpnc-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-plugin-wireguard-1.40-2.2.ppc64le", "product": { "name": "connman-plugin-wireguard-1.40-2.2.ppc64le", "product_id": "connman-plugin-wireguard-1.40-2.2.ppc64le" } }, { "category": "product_version", "name": "connman-test-1.40-2.2.ppc64le", "product": { "name": "connman-test-1.40-2.2.ppc64le", "product_id": "connman-test-1.40-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "connman-1.40-2.2.s390x", "product": { "name": "connman-1.40-2.2.s390x", "product_id": "connman-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-client-1.40-2.2.s390x", "product": { "name": "connman-client-1.40-2.2.s390x", "product_id": "connman-client-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-devel-1.40-2.2.s390x", "product": { "name": "connman-devel-1.40-2.2.s390x", "product_id": "connman-devel-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-doc-1.40-2.2.s390x", "product": { "name": "connman-doc-1.40-2.2.s390x", "product_id": "connman-doc-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-nmcompat-1.40-2.2.s390x", "product": { "name": "connman-nmcompat-1.40-2.2.s390x", "product_id": "connman-nmcompat-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-hh2serial-gps-1.40-2.2.s390x", "product": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.s390x", "product_id": "connman-plugin-hh2serial-gps-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-iospm-1.40-2.2.s390x", "product": { "name": "connman-plugin-iospm-1.40-2.2.s390x", "product_id": "connman-plugin-iospm-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-l2tp-1.40-2.2.s390x", "product": { "name": "connman-plugin-l2tp-1.40-2.2.s390x", "product_id": "connman-plugin-l2tp-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-openconnect-1.40-2.2.s390x", "product": { "name": "connman-plugin-openconnect-1.40-2.2.s390x", "product_id": "connman-plugin-openconnect-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-openvpn-1.40-2.2.s390x", "product": { "name": "connman-plugin-openvpn-1.40-2.2.s390x", "product_id": "connman-plugin-openvpn-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-polkit-1.40-2.2.s390x", "product": { "name": "connman-plugin-polkit-1.40-2.2.s390x", "product_id": "connman-plugin-polkit-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-pptp-1.40-2.2.s390x", "product": { "name": "connman-plugin-pptp-1.40-2.2.s390x", "product_id": "connman-plugin-pptp-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-tist-1.40-2.2.s390x", "product": { "name": "connman-plugin-tist-1.40-2.2.s390x", "product_id": "connman-plugin-tist-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-vpnc-1.40-2.2.s390x", "product": { "name": "connman-plugin-vpnc-1.40-2.2.s390x", "product_id": "connman-plugin-vpnc-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-plugin-wireguard-1.40-2.2.s390x", "product": { "name": "connman-plugin-wireguard-1.40-2.2.s390x", "product_id": "connman-plugin-wireguard-1.40-2.2.s390x" } }, { "category": "product_version", "name": "connman-test-1.40-2.2.s390x", "product": { "name": "connman-test-1.40-2.2.s390x", "product_id": "connman-test-1.40-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "connman-1.40-2.2.x86_64", "product": { "name": "connman-1.40-2.2.x86_64", "product_id": "connman-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-client-1.40-2.2.x86_64", "product": { "name": "connman-client-1.40-2.2.x86_64", "product_id": "connman-client-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-devel-1.40-2.2.x86_64", "product": { "name": "connman-devel-1.40-2.2.x86_64", "product_id": "connman-devel-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-doc-1.40-2.2.x86_64", "product": { "name": "connman-doc-1.40-2.2.x86_64", "product_id": "connman-doc-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-nmcompat-1.40-2.2.x86_64", "product": { "name": "connman-nmcompat-1.40-2.2.x86_64", "product_id": "connman-nmcompat-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "product": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "product_id": "connman-plugin-hh2serial-gps-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-iospm-1.40-2.2.x86_64", "product": { "name": "connman-plugin-iospm-1.40-2.2.x86_64", "product_id": "connman-plugin-iospm-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-l2tp-1.40-2.2.x86_64", "product": { "name": "connman-plugin-l2tp-1.40-2.2.x86_64", "product_id": "connman-plugin-l2tp-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-openconnect-1.40-2.2.x86_64", "product": { "name": "connman-plugin-openconnect-1.40-2.2.x86_64", "product_id": "connman-plugin-openconnect-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-openvpn-1.40-2.2.x86_64", "product": { "name": "connman-plugin-openvpn-1.40-2.2.x86_64", "product_id": "connman-plugin-openvpn-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-polkit-1.40-2.2.x86_64", "product": { "name": "connman-plugin-polkit-1.40-2.2.x86_64", "product_id": "connman-plugin-polkit-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-pptp-1.40-2.2.x86_64", "product": { "name": "connman-plugin-pptp-1.40-2.2.x86_64", "product_id": "connman-plugin-pptp-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-tist-1.40-2.2.x86_64", "product": { "name": "connman-plugin-tist-1.40-2.2.x86_64", "product_id": "connman-plugin-tist-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-vpnc-1.40-2.2.x86_64", "product": { "name": "connman-plugin-vpnc-1.40-2.2.x86_64", "product_id": "connman-plugin-vpnc-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-plugin-wireguard-1.40-2.2.x86_64", "product": { "name": "connman-plugin-wireguard-1.40-2.2.x86_64", "product_id": "connman-plugin-wireguard-1.40-2.2.x86_64" } }, { "category": "product_version", "name": "connman-test-1.40-2.2.x86_64", "product": { "name": "connman-test-1.40-2.2.x86_64", "product_id": "connman-test-1.40-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "connman-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-1.40-2.2.aarch64" }, "product_reference": "connman-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le" }, "product_reference": "connman-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-1.40-2.2.s390x" }, "product_reference": "connman-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-1.40-2.2.x86_64" }, "product_reference": "connman-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-client-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64" }, "product_reference": "connman-client-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-client-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le" }, "product_reference": "connman-client-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-client-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x" }, "product_reference": "connman-client-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-client-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64" }, "product_reference": "connman-client-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-devel-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64" }, "product_reference": "connman-devel-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-devel-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le" }, "product_reference": "connman-devel-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-devel-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x" }, "product_reference": "connman-devel-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-devel-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64" }, "product_reference": "connman-devel-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-doc-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64" }, "product_reference": "connman-doc-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-doc-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le" }, "product_reference": "connman-doc-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-doc-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x" }, "product_reference": "connman-doc-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-doc-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64" }, "product_reference": "connman-doc-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-nmcompat-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64" }, "product_reference": "connman-nmcompat-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-nmcompat-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le" }, "product_reference": "connman-nmcompat-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-nmcompat-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x" }, "product_reference": "connman-nmcompat-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-nmcompat-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64" }, "product_reference": "connman-nmcompat-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x" }, "product_reference": "connman-plugin-hh2serial-gps-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-hh2serial-gps-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-iospm-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-iospm-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-iospm-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-iospm-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-iospm-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x" }, "product_reference": "connman-plugin-iospm-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-iospm-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-iospm-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-l2tp-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-l2tp-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-l2tp-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-l2tp-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-l2tp-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x" }, "product_reference": "connman-plugin-l2tp-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-l2tp-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-l2tp-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openconnect-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-openconnect-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openconnect-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-openconnect-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openconnect-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x" }, "product_reference": "connman-plugin-openconnect-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openconnect-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-openconnect-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openvpn-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-openvpn-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openvpn-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-openvpn-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openvpn-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x" }, "product_reference": "connman-plugin-openvpn-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-openvpn-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-openvpn-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-polkit-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-polkit-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-polkit-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-polkit-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-polkit-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x" }, "product_reference": "connman-plugin-polkit-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-polkit-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-polkit-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-pptp-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-pptp-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-pptp-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-pptp-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-pptp-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x" }, "product_reference": "connman-plugin-pptp-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-pptp-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-pptp-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-tist-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-tist-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-tist-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-tist-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-tist-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x" }, "product_reference": "connman-plugin-tist-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-tist-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-tist-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-vpnc-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-vpnc-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-vpnc-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-vpnc-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-vpnc-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x" }, "product_reference": "connman-plugin-vpnc-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-vpnc-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-vpnc-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-wireguard-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64" }, "product_reference": "connman-plugin-wireguard-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-wireguard-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le" }, "product_reference": "connman-plugin-wireguard-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-wireguard-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x" }, "product_reference": "connman-plugin-wireguard-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-plugin-wireguard-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64" }, "product_reference": "connman-plugin-wireguard-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-test-1.40-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64" }, "product_reference": "connman-test-1.40-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-test-1.40-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le" }, "product_reference": "connman-test-1.40-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-test-1.40-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x" }, "product_reference": "connman-test-1.40-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "connman-test-1.40-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" }, "product_reference": "connman-test-1.40-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12865" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12865", "url": "https://www.suse.com/security/cve/CVE-2017-12865" }, { "category": "external", "summary": "SUSE Bug 1054720 for CVE-2017-12865", "url": "https://bugzilla.suse.com/1054720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12865" }, { "cve": "CVE-2021-26675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26675" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26675", "url": "https://www.suse.com/security/cve/CVE-2021-26675" }, { "category": "external", "summary": "SUSE Bug 1181751 for CVE-2021-26675", "url": "https://bugzilla.suse.com/1181751" }, { "category": "external", "summary": "SUSE Bug 1186869 for CVE-2021-26675", "url": "https://bugzilla.suse.com/1186869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26675" }, { "cve": "CVE-2021-26676", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26676" } ], "notes": [ { "category": "general", "text": "gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26676", "url": "https://www.suse.com/security/cve/CVE-2021-26676" }, { "category": "external", "summary": "SUSE Bug 1181751 for CVE-2021-26676", "url": "https://bugzilla.suse.com/1181751" }, { "category": "external", "summary": "SUSE Bug 1186869 for CVE-2021-26676", "url": "https://bugzilla.suse.com/1186869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26676" }, { "cve": "CVE-2021-33833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33833" } ], "notes": [ { "category": "general", "text": "ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33833", "url": "https://www.suse.com/security/cve/CVE-2021-33833" }, { "category": "external", "summary": "SUSE Bug 1186869 for CVE-2021-33833", "url": "https://bugzilla.suse.com/1186869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:connman-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-client-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-client-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-client-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-client-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-devel-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-devel-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-devel-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-doc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-doc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-doc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-nmcompat-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-hh2serial-gps-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-iospm-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-l2tp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openconnect-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-openvpn-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-polkit-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-pptp-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-tist-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-vpnc-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-plugin-wireguard-1.40-2.2.x86_64", "openSUSE Tumbleweed:connman-test-1.40-2.2.aarch64", "openSUSE Tumbleweed:connman-test-1.40-2.2.ppc64le", "openSUSE Tumbleweed:connman-test-1.40-2.2.s390x", "openSUSE Tumbleweed:connman-test-1.40-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33833" } ] }
var-201708-1104
Vulnerability from variot
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable. ConnMan Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. connman is prone to a stack-based buffer overflow vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. connman 1.34 and prior are vulnerable. ConnMan is a tool for network management on Tizen systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Debian Security Advisory DSA-3956-1 security@debian.org https://www.debian.org/security/ Luciano Bello August 27, 2017 https://www.debian.org/security/faq
Package : connman CVE ID : CVE-2017-12865 Debian Bug : 872844
Security consultants in NRI Secure Technologies discovered a stack overflow vulnerability in ConnMan, a network manager for embedded devices.
For the oldstable distribution (jessie), this problem has been fixed in version 1.21-1.2+deb8u1.
For the stable distribution (stretch), this problem has been fixed in version 1.33-3+deb9u1.
For the testing distribution (buster), this problem has been fixed in version 1.33-3+deb9u1.
For the unstable distribution (sid), this problem has been fixed in version 1.35-1.
We recommend that you upgrade your connman packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEayzFlnvRveqeWJspbsLe9o/+N3QFAlmjRVgACgkQbsLe9o/+ N3T3/Q//VQRbz2KIvb/nJA79D9HsmJiV5MCs8odlsPfV+796eENsgepO3elsdm75 vo5FHTORoN+tc2cw9zOkpgR/tTNYVFq/adcchecjW6E8Ruh57AwT1PaDDStaTger ra9tk3QBVOWBkhdZmag8RxNt99EK9o1pVn0zu2cdNWwWR+0DJFLOTn+icvaX9a00 E53GXX/CCMEYw0Smo3t3D0HuR6NLLDFbyV1Cf/fte29Hdt7Ni0aXUZsjyqlND7LI mF1m4OcouoGhS/QFBEkIsduMs07Merc7ZHQ93z/RMtqQzo9Ev/7qBsgGG7TokTif m+HmH6x6OJ+QIVca2VK7i3pKmWu+zLtF5zixG/U0ED5nVoeDE1vnHmLlQilHOzi/ Dxmb6gPNQvbLYE3Hr2ytgL4ICmADVeUlpVfEc4km17G8fiTCaCY5vAlKRUy209bE d9izLn1u3J2i1gb3IsJ1qxfIG3kxy6xnXXED0sGZXCp61HU2SaXTiK76B5MLiBHP wQN335oSsRIbORSsCvfcqVUAtLs9BLqV3fQ57wb7nM5qH7vfHndcGXc/lVNb6eJe 3PjOIyDUU58K987FnvbN+FSWGuv5cfbsQLZwfICU5s95r2EAoS06tk2/iGU76Wwy zjmu3on4C2men6TxIaWCOamkBR+igB9MvRIRD2wRIUkg5mudmf8= =p3fr -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201812-02
https://security.gentoo.org/
Severity: Normal Title: ConnMan: Multiple vulnerabilities Date: December 02, 2018 Bugs: #628566, #630028 ID: 201812-02
Synopsis
Multiple vulnerabilities have been found in ConnMan, the worst of which could result in the remote execution of code.
Background
ConnMan provides a daemon for managing Internet connections.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/connman < 1.35-r1 >= 1.35-r1
Description
Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All ConnMan users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.35-r1"
References
[ 1 ] CVE-2017-12865 https://nvd.nist.gov/vuln/detail/CVE-2017-12865 [ 2 ] CVE-2017-5716 https://nvd.nist.gov/vuln/detail/CVE-2017-5716
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201812-02
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1104", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "connman", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "1.34" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "connman", "scope": "eq", "trust": 0.9, "vendor": "connman", "version": "1.34" }, { "model": "connman", "scope": "lte", "trust": 0.8, "vendor": "connman", "version": "1.34" }, { "model": "gnu/linux", "scope": "eq", "trust": 0.8, "vendor": "debian", "version": "8.0" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.33" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.32" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.31" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.30" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.3" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.20" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.10" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "1.0" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.90" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.80" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.70" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.60" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.50" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.40" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.30" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.20" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.10" }, { "model": "connman", "scope": "eq", "trust": 0.3, "vendor": "connman", "version": "0.1" }, { "model": "connman", "scope": "ne", "trust": 0.3, "vendor": "connman", "version": "1.35" } ], "sources": [ { "db": "BID", "id": "100498" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "CNNVD", "id": "CNNVD-201708-622" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:connman_project:connman", "vulnerable": true }, { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007631" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pedro Sampaio", "sources": [ { "db": "BID", "id": "100498" } ], "trust": 0.3 }, "cve": "CVE-2017-12865", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-12865", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-103430", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-12865", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-12865", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-12865", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-12865", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201708-622", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-103430", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-103430" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "CNNVD", "id": "CNNVD-201708-622" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable. ConnMan Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. connman is prone to a stack-based buffer overflow vulnerability. \nAttackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. \nconnman 1.34 and prior are vulnerable. ConnMan is a tool for network management on Tizen systems. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3956-1 security@debian.org\nhttps://www.debian.org/security/ Luciano Bello\nAugust 27, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : connman\nCVE ID : CVE-2017-12865\nDebian Bug : 872844\n\nSecurity consultants in NRI Secure Technologies discovered a stack\noverflow vulnerability in ConnMan, a network manager for embedded\ndevices. \n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 1.21-1.2+deb8u1. \n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 1.33-3+deb9u1. \n\nFor the testing distribution (buster), this problem has been fixed\nin version 1.33-3+deb9u1. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.35-1. \n\nWe recommend that you upgrade your connman packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nzjmu3on4C2men6TxIaWCOamkBR+igB9MvRIRD2wRIUkg5mudmf8=\n=p3fr\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201812-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ConnMan: Multiple vulnerabilities\n Date: December 02, 2018\n Bugs: #628566, #630028\n ID: 201812-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in ConnMan, the worst of which\ncould result in the remote execution of code. \n\nBackground\n==========\n\nConnMan provides a daemon for managing Internet connections. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/connman \u003c 1.35-r1 \u003e= 1.35-r1 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in ConnMan. Please review\nthe CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll ConnMan users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/connman-1.35-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-12865\n https://nvd.nist.gov/vuln/detail/CVE-2017-12865\n[ 2 ] CVE-2017-5716\n https://nvd.nist.gov/vuln/detail/CVE-2017-5716\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201812-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2017-12865" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "BID", "id": "100498" }, { "db": "VULHUB", "id": "VHN-103430" }, { "db": "PACKETSTORM", "id": "143931" }, { "db": "PACKETSTORM", "id": "150558" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12865", "trust": 3.0 }, { "db": "BID", "id": "100498", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2017-007631", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201708-622", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "150558", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143931", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-103430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-103430" }, { "db": "BID", "id": "100498" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "PACKETSTORM", "id": "143931" }, { "db": "PACKETSTORM", "id": "150558" }, { "db": "CNNVD", "id": "CNNVD-201708-622" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "id": "VAR-201708-1104", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-103430" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:17:48.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ConnMan Project Connection Manager Daemon Buffer Overflow", "trust": 0.8, "url": "https://01.org/security/advisories/intel-oss-10001" }, { "title": "DSA-3956", "trust": 0.8, "url": "https://www.debian.org/security/2017/dsa-3956" }, { "title": "dnsproxy: Fix crash on malformed DNS response", "trust": 0.8, "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "title": "ConnMan Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111156" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "CNNVD", "id": "CNNVD-201708-622" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-103430" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "trust": 2.0, "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201812-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/100498" }, { "trust": 1.7, "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "trust": 1.7, "url": "http://www.debian.org/security/2017/dsa-3956" }, { "trust": 1.7, "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12865" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12865" }, { "trust": 0.3, "url": "http://connman.net/" }, { "trust": 0.3, "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=ebc8fda495ce285505b77e70c5b3fd45dfd3ab63" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5716" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "VULHUB", "id": "VHN-103430" }, { "db": "BID", "id": "100498" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "PACKETSTORM", "id": "143931" }, { "db": "PACKETSTORM", "id": "150558" }, { "db": "CNNVD", "id": "CNNVD-201708-622" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-103430" }, { "db": "BID", "id": "100498" }, { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "PACKETSTORM", "id": "143931" }, { "db": "PACKETSTORM", "id": "150558" }, { "db": "CNNVD", "id": "CNNVD-201708-622" }, { "db": "NVD", "id": "CVE-2017-12865" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-103430" }, { "date": "2017-08-21T00:00:00", "db": "BID", "id": "100498" }, { "date": "2017-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "date": "2017-08-28T23:23:00", "db": "PACKETSTORM", "id": "143931" }, { "date": "2018-12-03T21:05:54", "db": "PACKETSTORM", "id": "150558" }, { "date": "2017-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-622" }, { "date": "2017-08-29T16:29:00.217000", "db": "NVD", "id": "CVE-2017-12865" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-05T00:00:00", "db": "VULHUB", "id": "VHN-103430" }, { "date": "2017-08-21T00:00:00", "db": "BID", "id": "100498" }, { "date": "2017-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "date": "2020-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-622" }, { "date": "2024-11-21T03:10:20.010000", "db": "NVD", "id": "CVE-2017-12865" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "150558" }, { "db": "CNNVD", "id": "CNNVD-201708-622" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ConnMan Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007631" }, { "db": "CNNVD", "id": "CNNVD-201708-622" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-622" } ], "trust": 0.6 } }
fkie_cve-2017-12865
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | connman | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*", "matchCriteriaId": "1919AFA0-4CCB-491B-9364-AD47CD7BB068", "versionEndIncluding": "1.34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in \"dnsproxy.c\" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the \"name\" variable." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en pila en \"dnsproxy.c\" en connman 1.34 y anteriores permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (bloqueo) o ejecuten c\u00f3digo arbitrario mediante una cadena de consulta de respuesta manipulada pasada a la variable \"name\"." } ], "id": "CVE-2017-12865", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-29T16:29:00.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3956" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100498" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201812-02" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://01.org/security/intel-oss-10001/intel-oss-10001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201812-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.nri-secure.com/blog/new-iot-vulnerability-connmando" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.