Use After Free Affecting connman package, versions *
Attack Complexity
High
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-DEBIAN10-CONNMAN-2970493
-
published
4 Aug 2022
-
disclosed
3 Aug 2022
How to fix?
There is no fixed version for Debian:10
connman
.
NVD Description
Note: Versions mentioned in the description apply to the upstream connman
package.
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.