Bug 1186869 (CVE-2021-33833) - VUL-0: CVE-2021-33833: connman: stack based buffer overflow in dnsproxy
Summary: VUL-0: CVE-2021-33833: connman: stack based buffer overflow in dnsproxy
Status: RESOLVED FIXED
Alias: CVE-2021-33833
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Daniel Wagner
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/301305/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-33833:8.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-06-04 13:15 UTC by Marcus Meissner
Modified: 2022-01-25 10:44 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Marcus Meissner 2021-06-05 14:54:14 UTC
CVE-2021-33833
Comment 4 Marcus Meissner 2021-06-05 14:57:23 UTC
CRD: 2021-06-09 8:00UTC
Comment 5 Marcus Meissner 2021-06-05 15:41:48 UTC
i notified linux-distros just now
Comment 7 Marcus Meissner 2021-06-09 08:17:26 UTC
public
Comment 9 Daniel Wagner 2022-01-25 10:44:17 UTC
Has been fixed by updating ConnMan to version 1.40.