In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
References
Link | Resource |
---|---|
https://lore.kernel.org/connman/20220801080043.4861-3-wagi@monom.org/ | Mailing List Patch Third Party Advisory |
https://lore.kernel.org/connman/20220801080043.4861-1-wagi@monom.org/ | Mailing List Patch Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1200190 | Issue Tracking Third Party Advisory |
https://www.debian.org/security/2022/dsa-5231 | Third Party Advisory |
Information
Published : 2022-08-03 07:15
Updated : 2022-09-29 09:01
NVD link : CVE-2022-32293
Mitre link : CVE-2022-32293
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
intel
- connman