0.004 Low
EPSS
Percentile
73.9%
ConnMan has buffer overflow. The vulnerability exists due to a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
www.openwall.com/lists/oss-security/2021/06/09/1
www.openwall.com/lists/oss-security/2022/01/25/1
lists.debian.org/debian-lts-announce/2022/02/msg00009.html
lore.kernel.org/connman/
security-tracker.debian.org/tracker/CVE-2021-33833
security.gentoo.org/glsa/202107-29