Vulnerability Description
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Connman | <= 1.40 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/network/connman/connman.git/log/ProductThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/02/msg00009.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202310-21Third Party Advisory
- https://www.debian.org/security/2022/dsa-5231Third Party Advisory
- https://www.openwall.com/lists/oss-security/2022/01/25/1ExploitMailing ListThird Party Advisory
- https://git.kernel.org/pub/scm/network/connman/connman.git/log/ProductThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/02/msg00009.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202310-21Third Party Advisory
- https://www.debian.org/security/2022/dsa-5231Third Party Advisory
- https://www.openwall.com/lists/oss-security/2022/01/25/1ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2022-23097?
CVE-2022-23097 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
How severe is CVE-2022-23097?
CVE-2022-23097 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-23097?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Connman, Debian Debian Linux.