DEBIAN-CVE-2022-23098

Source
https://security-tracker.debian.org/tracker/CVE-2022-23098
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-23098.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-23098
Upstream
Published
2022-01-28T16:15:07Z
Modified
2025-09-30T05:15:34.648924Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

References

Affected packages

Debian:11 / connman

Package

Name
connman
Purl
pkg:deb/debian/connman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.2+deb11u1

Affected versions

1.*

1.36-2.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / connman

Package

Name
connman
Purl
pkg:deb/debian/connman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / connman

Package

Name
connman
Purl
pkg:deb/debian/connman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / connman

Package

Name
connman
Purl
pkg:deb/debian/connman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.4

Ecosystem specific

{
    "urgency": "not yet assigned"
}