USN-6236-1

Source
https://ubuntu.com/security/notices/USN-6236-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6236-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-6236-1
Related
Published
2023-07-19T08:45:49.026763Z
Modified
2023-07-19T08:45:49.026763Z
Summary
connman vulnerabilities
Details

It was discovered that ConnMan could be made to write out of bounds. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-26675, CVE-2021-33833)

It was discovered that ConnMan could be made to leak sensitive information via the gdhcp component. A remote attacker could possibly use this issue to obtain information for further exploitation. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)

It was discovered that ConnMan could be made to read out of bounds. A remote attacker could possibly use this issue to case ConnMan to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23096, CVE-2022-23097)

It was discovered that ConnMan could be made to run into an infinite loop. A remote attacker could possibly use this issue to cause ConnMan to consume resources and to stop operating, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)

It was discovered that ConnMan could be made to write out of bounds via the gweb component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)

It was discovered that ConnMan did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)

It was discovered that ConnMan could be made to write out of bounds via the gdhcp component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-28488)

References

Affected packages

Ubuntu:Pro:16.04:LTS / connman

Package

Name
connman
Purl
pkg:deb/ubuntu/connman?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21-1.2+deb8u1ubuntu0.1~esm1

Affected versions

1.*

1.21-1.2
1.21-1.2build1
1.21-1.2build2
1.21-1.2+deb8u1build0.16.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman"
        },
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman-dbgsym"
        },
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman-dev"
        },
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman-doc"
        },
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman-vpn"
        },
        {
            "binary_version": "1.21-1.2+deb8u1ubuntu0.1~esm1",
            "binary_name": "connman-vpn-dbgsym"
        }
    ]
}

Ubuntu:Pro:18.04:LTS / connman

Package

Name
connman
Purl
pkg:deb/ubuntu/connman?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.35-6ubuntu0.1~esm1

Affected versions

1.*

1.35-1
1.35-2
1.35-6

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman"
        },
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman-dbgsym"
        },
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman-dev"
        },
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman-doc"
        },
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman-vpn"
        },
        {
            "binary_version": "1.35-6ubuntu0.1~esm1",
            "binary_name": "connman-vpn-dbgsym"
        }
    ]
}

Ubuntu:20.04:LTS / connman

Package

Name
connman
Purl
pkg:deb/ubuntu/connman?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2ubuntu0.1

Affected versions

1.*

1.36-2build1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman"
        },
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman-dbgsym"
        },
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman-dev"
        },
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman-doc"
        },
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman-vpn"
        },
        {
            "binary_version": "1.36-2ubuntu0.1",
            "binary_name": "connman-vpn-dbgsym"
        }
    ]
}

Ubuntu:22.04:LTS / connman

Package

Name
connman
Purl
pkg:deb/ubuntu/connman?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.36-2.3ubuntu0.1

Affected versions

1.*

1.36-2.2build1
1.36-2.3
1.36-2.3build1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman"
        },
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman-dbgsym"
        },
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman-dev"
        },
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman-doc"
        },
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman-vpn"
        },
        {
            "binary_version": "1.36-2.3ubuntu0.1",
            "binary_name": "connman-vpn-dbgsym"
        }
    ]
}