USN-6236-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6236-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-6236-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6236-1
Related
  • CVE-2021-26675
  • CVE-2021-26676
  • CVE-2021-33833
  • CVE-2022-23096
  • CVE-2022-23097
  • CVE-2022-23098
  • CVE-2022-32292
  • CVE-2022-32293
  • CVE-2023-28488
Published
2023-07-19T08:45:49.026763Z
Modified
2023-07-19T08:45:49.026763Z
Summary
connman vulnerabilities
Details

It was discovered that ConnMan could be made to write out of bounds. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-26675, CVE-2021-33833)

It was discovered that ConnMan could be made to leak sensitive information via the gdhcp component. A remote attacker could possibly use this issue to obtain information for further exploitation. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)

It was discovered that ConnMan could be made to read out of bounds. A remote attacker could possibly use this issue to case ConnMan to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23096, CVE-2022-23097)

It was discovered that ConnMan could be made to run into an infinite loop. A remote attacker could possibly use this issue to cause ConnMan to consume resources and to stop operating, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)

It was discovered that ConnMan could be made to write out of bounds via the gweb component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)

It was discovered that ConnMan did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)

It was discovered that ConnMan could be made to write out of bounds via the gdhcp component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-28488)

References

Affected packages

Ubuntu:Pro:18.04:LTS / connman

Package

Name
connman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.35-6ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "connman-vpn": "1.35-6ubuntu0.1~esm1",
            "connman": "1.35-6ubuntu0.1~esm1",
            "connman-dev": "1.35-6ubuntu0.1~esm1",
            "connman-doc": "1.35-6ubuntu0.1~esm1"
        }
    ]
}

Ubuntu:20.04:LTS / connman

Package

Name
connman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "connman-vpn": "1.36-2ubuntu0.1",
            "connman": "1.36-2ubuntu0.1",
            "connman-dev": "1.36-2ubuntu0.1",
            "connman-doc": "1.36-2ubuntu0.1"
        }
    ]
}

Ubuntu:22.04:LTS / connman

Package

Name
connman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.3ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "connman-vpn": "1.36-2.3ubuntu0.1",
            "connman": "1.36-2.3ubuntu0.1",
            "connman-dev": "1.36-2.3ubuntu0.1",
            "connman-doc": "1.36-2.3ubuntu0.1"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / connman

Package

Name
connman

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21-1.2+deb8u1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "connman-vpn": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "connman": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "connman-dev": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "connman-doc": "1.21-1.2+deb8u1ubuntu0.1~esm1"
        }
    ]
}