Upstream information

CVE-2023-28488 at MITRE

Description

client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 6.5
Vector CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1210395 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP4
  • connman >= 1.42-bp154.2.6.1
  • connman-client >= 1.42-bp154.2.6.1
  • connman-devel >= 1.42-bp154.2.6.1
  • connman-doc >= 1.42-bp154.2.6.1
  • connman-nmcompat >= 1.42-bp154.2.6.1
  • connman-plugin-hh2serial-gps >= 1.42-bp154.2.6.1
  • connman-plugin-iospm >= 1.42-bp154.2.6.1
  • connman-plugin-l2tp >= 1.42-bp154.2.6.1
  • connman-plugin-openvpn >= 1.42-bp154.2.6.1
  • connman-plugin-polkit >= 1.42-bp154.2.6.1
  • connman-plugin-pptp >= 1.42-bp154.2.6.1
  • connman-plugin-tist >= 1.42-bp154.2.6.1
  • connman-plugin-vpnc >= 1.42-bp154.2.6.1
  • connman-plugin-wireguard >= 1.42-bp154.2.6.1
  • connman-test >= 1.42-bp154.2.6.1
Patchnames:
openSUSE-2023-370
SUSE Package Hub 15 SP5
  • connman >= 1.42-bp155.4.3.1
  • connman-client >= 1.42-bp155.4.3.1
  • connman-devel >= 1.42-bp155.4.3.1
  • connman-doc >= 1.42-bp155.4.3.1
  • connman-nmcompat >= 1.42-bp155.4.3.1
  • connman-plugin-hh2serial-gps >= 1.42-bp155.4.3.1
  • connman-plugin-iospm >= 1.42-bp155.4.3.1
  • connman-plugin-l2tp >= 1.42-bp155.4.3.1
  • connman-plugin-openvpn >= 1.42-bp155.4.3.1
  • connman-plugin-polkit >= 1.42-bp155.4.3.1
  • connman-plugin-pptp >= 1.42-bp155.4.3.1
  • connman-plugin-tist >= 1.42-bp155.4.3.1
  • connman-plugin-vpnc >= 1.42-bp155.4.3.1
  • connman-plugin-wireguard >= 1.42-bp155.4.3.1
  • connman-test >= 1.42-bp155.4.3.1
Patchnames:
openSUSE-2023-369
openSUSE Leap 15.4
  • connman >= 1.42-bp154.2.6.1
  • connman-client >= 1.42-bp154.2.6.1
  • connman-devel >= 1.42-bp154.2.6.1
  • connman-doc >= 1.42-bp154.2.6.1
  • connman-nmcompat >= 1.42-bp154.2.6.1
  • connman-plugin-hh2serial-gps >= 1.42-bp154.2.6.1
  • connman-plugin-iospm >= 1.42-bp154.2.6.1
  • connman-plugin-l2tp >= 1.42-bp154.2.6.1
  • connman-plugin-openvpn >= 1.42-bp154.2.6.1
  • connman-plugin-polkit >= 1.42-bp154.2.6.1
  • connman-plugin-pptp >= 1.42-bp154.2.6.1
  • connman-plugin-tist >= 1.42-bp154.2.6.1
  • connman-plugin-vpnc >= 1.42-bp154.2.6.1
  • connman-plugin-wireguard >= 1.42-bp154.2.6.1
  • connman-test >= 1.42-bp154.2.6.1
Patchnames:
openSUSE-2023-370
openSUSE Leap 15.5
  • connman >= 1.42-bp155.4.3.1
  • connman-client >= 1.42-bp155.4.3.1
  • connman-devel >= 1.42-bp155.4.3.1
  • connman-doc >= 1.42-bp155.4.3.1
  • connman-nmcompat >= 1.42-bp155.4.3.1
  • connman-plugin-hh2serial-gps >= 1.42-bp155.4.3.1
  • connman-plugin-iospm >= 1.42-bp155.4.3.1
  • connman-plugin-l2tp >= 1.42-bp155.4.3.1
  • connman-plugin-openvpn >= 1.42-bp155.4.3.1
  • connman-plugin-polkit >= 1.42-bp155.4.3.1
  • connman-plugin-pptp >= 1.42-bp155.4.3.1
  • connman-plugin-tist >= 1.42-bp155.4.3.1
  • connman-plugin-vpnc >= 1.42-bp155.4.3.1
  • connman-plugin-wireguard >= 1.42-bp155.4.3.1
  • connman-test >= 1.42-bp155.4.3.1
Patchnames:
openSUSE-2023-369
openSUSE Tumbleweed
  • connman >= 1.42-1.1
  • connman-client >= 1.42-1.1
  • connman-devel >= 1.42-1.1
  • connman-doc >= 1.42-1.1
  • connman-nmcompat >= 1.42-1.1
  • connman-plugin-hh2serial-gps >= 1.42-1.1
  • connman-plugin-iospm >= 1.42-1.1
  • connman-plugin-l2tp >= 1.42-1.1
  • connman-plugin-openconnect >= 1.42-1.1
  • connman-plugin-openvpn >= 1.42-1.1
  • connman-plugin-polkit >= 1.42-1.1
  • connman-plugin-pptp >= 1.42-1.1
  • connman-plugin-tist >= 1.42-1.1
  • connman-plugin-vpnc >= 1.42-1.1
  • connman-plugin-wireguard >= 1.42-1.1
  • connman-test >= 1.42-1.1
Patchnames:
openSUSE-Tumbleweed-2024-13420


SUSE Timeline for this CVE

CVE page created: Wed Apr 12 20:00:58 2023
CVE page last modified: Tue Sep 3 19:29:28 2024