vulnerability
SUSE: CVE-2021-26675: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:N/C:P/I:P/A:P) | Feb 9, 2021 | Mar 17, 2021 | Oct 26, 2022 |
Severity
6
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
Published
Feb 9, 2021
Added
Mar 17, 2021
Modified
Oct 26, 2022
Description
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
Solutions
suse-upgrade-connmansuse-upgrade-connman-clientsuse-upgrade-connman-develsuse-upgrade-connman-docsuse-upgrade-connman-nmcompatsuse-upgrade-connman-plugin-hh2serial-gpssuse-upgrade-connman-plugin-iospmsuse-upgrade-connman-plugin-l2tpsuse-upgrade-connman-plugin-openconnectsuse-upgrade-connman-plugin-openvpnsuse-upgrade-connman-plugin-polkitsuse-upgrade-connman-plugin-pptpsuse-upgrade-connman-plugin-tistsuse-upgrade-connman-plugin-vpncsuse-upgrade-connman-plugin-wireguardsuse-upgrade-connman-test
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.