DSA-5416-1

Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5416-1.json
Published
2023-05-31T00:00:00Z
Modified
2023-06-28T06:51:26.822167Z
Details

It was discovered that there was a potential buffer overflow and denial of service vulnerabilty in the gdhcp client implementation of connman, a command-line network manager designed for use on embedded devices.

For the stable distribution (bullseye), this problem has been fixed in version 1.36-2.2+deb11u2.

We recommend that you upgrade your connman packages.

For the detailed security status of connman please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/connman

References

Affected packages

Debian:11 / connman

Source Details

Package Name
connman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.36-2.2+deb11u2

Affected versions

1.*

1.36-2.2
1.36-2.2+deb11u1