CVE-2021-33833
Summary
| CVE | CVE-2021-33833 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-09 18:15:00 UTC |
| Updated | 2022-02-09 21:20:00 UTC |
| Description | ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA). |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| oss-security - connman stack buffer overflow in dnsproxy CVE-2021-33833 |
MLIST |
www.openwall.com |
|
| oss-security - Multiple vulnerabilities in connman's dnsproxy component |
MLIST |
www.openwall.com |
|
| [SECURITY] [DLA 2915-1] connman security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| ConnMan network manager |
MISC |
lore.kernel.org |
|
| ConnMan: Multiple vulnerabilities (GLSA 202107-29) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179062 Debian Security Update for connman (DLA 2915-1)
- 180178 Debian Security Update for connman (CVE-2021-33833)
- 199592 Ubuntu Security Notification for ConnMan Vulnerabilities (USN-6236-1)
- 710039 Gentoo Linux ConnMan Multiple Vulnerabilities (GLSA 202107-29)