An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 9.0 | |
debian_linux | eq | 11.0 | |
connman | le | 1.40 |