vulnerability
SUSE: CVE-2022-32292: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Aug 3, 2022 | Oct 26, 2022 | Jan 28, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 3, 2022
Added
Oct 26, 2022
Modified
Jan 28, 2025
Description
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
Solutions
suse-upgrade-connmansuse-upgrade-connman-clientsuse-upgrade-connman-develsuse-upgrade-connman-docsuse-upgrade-connman-nmcompatsuse-upgrade-connman-plugin-hh2serial-gpssuse-upgrade-connman-plugin-iospmsuse-upgrade-connman-plugin-l2tpsuse-upgrade-connman-plugin-openvpnsuse-upgrade-connman-plugin-polkitsuse-upgrade-connman-plugin-pptpsuse-upgrade-connman-plugin-tistsuse-upgrade-connman-plugin-vpncsuse-upgrade-connman-plugin-wireguardsuse-upgrade-connman-test
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.