[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3105-1] connman security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3105-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
September 13, 2022                            https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : connman
Version        : 1.36-2.1~deb10u3
CVE IDs        : CVE-2022-32292 CVE-2022-32293
Debian Bug     : #1016976

It was discovered that there were two issues in connman, a daemon for
managing internet connections within embedded devices:

* CVE-2022-32292: Prevent an issue where remote attackers able to
  send HTTP requests to the gweb component were able to exploit a
  heap-based buffer overflow in the received_data function to execute
  code.

* CVE-2022-32293: Prevent a man-in-the-middle attack against a WISPR
  HTTP query which could be used to trigger a use-after-free in WISPR
  handling, leading to crashes or even code execution.

For Debian 10 buster, these problems have been fixed in version
1.36-2.1~deb10u3.

We recommend that you upgrade your connman packages.

For the detailed security status of connman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/connman

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmMgPbEACgkQHpU+J9Qx
HljL8g/+JdrCIjBw15SobSTfavo1CUnN0Qf6pqOOjbcmh9LTKyLP8yGTYqtcO9g4
cjWk6McwGHMWQqShGXSsixTWut60/W8BTGsq+f6uSRK8/Ww44NshFPQ6GT1oE6PL
irye6gDfbyh7QDnXZy7+UInwOxkLXqzk/CpIHkRGBSEkhluNJk8eNb0mt3E/IPow
+t/Kc67ag2KiDbYEjxM8QO4KUTv/cpjo4GEACEKQBmBNZdcPbSGtnAjwswdGyton
7cBoK1JB7n8k6rvOjSmary/6WulKZd4ab04/tmmC34aUADPymps6wYbJeKiBXq1t
y8defuaJjMMBNSTclBwfzzR17d8f5zYeh9vIBlr5VscTL2jI4tCYsfmWiparHOIK
ef8STaBULzqf5uF82TZcsowHtzLaCeIJcz4J4xxh1e4Z1RO5wTtKvkOBPi668QyN
sM7zg2sq4SvVyIwcdOwQUqgUoAeUziy+wKRbAhEx+SSElU3tT5o0Uh1HHX24/Skp
uLgpS3F/Y0nkOApXGzvjXX6nnNBcnnh5O8KLx1QrOkHE7xfG2vPInAsN8LT5kBLD
VrUGUQiIrXLRB/FFtvPYw49CxCLV43xFfVJsCfqXX63yv1YEJOtSB6bsQXAK3EKV
u7V+/X6o/7vj0V+Tqd5IzoVBmggoJkO3iiioOxSV1nTkR5LQZLg=
=eq/+
-----END PGP SIGNATURE-----


Reply to: