|
|
Subscribe / Log in / New account

Mageia alert MGASA-2022-0045 (connman)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2022-0045: Updated connman packages fix security vulnerability
Date:  Wed, 02 Feb 2022 22:30:27 +0100
Message-ID:  <20220202213027.D15019FE32@duvel.mageia.org>
Archive-link:  Article

MGASA-2022-0045 - Updated connman packages fix security vulnerability Publication date: 02 Feb 2022 URL: https://advisories.mageia.org/MGASA-2022-0045.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-23096, CVE-2022-23097, CVE-2022-23098 Description: TCP Receive Path does not Check for Presence of Sufficient Header Data. (CVE-2022-23096) Possibly invalid memory reference in 'strnlen()' call in 'forward_dns_reply()'. (CVE-2022-23097) TCP Receive Path Triggers 100 % CPU loop if DNS server does not Send Back Data. (CVE-2022-23098) References: - https://bugs.mageia.org/show_bug.cgi?id=29945 - https://www.openwall.com/lists/oss-security/2022/01/25/1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... SRPMS: - 8/core/connman-1.38-2.2.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds