MGASA-2023-0167

Source
https://advisories.mageia.org/MGASA-2023-0167.html
Import Source
https://advisories.mageia.org/MGASA-2023-0167.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0167
Related
Published
2023-05-16T19:17:40Z
Modified
2023-05-16T18:10:12Z
Summary
Updated connman packages fix security vulnerability
Details

client.c in gdhcp in ConnMan could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process. (CVE-2023-28488)

References
Credits

Affected packages

Mageia:8 / connman

Package

Name
connman
Purl
pkg:rpm/mageia/connman?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.38-2.4.mga8

Ecosystem specific

{
    "section": "core"
}