0.021 Low
EPSS
Percentile
89.0%
connman is vulnerable to denial of service. The vulnerability exists due to the heap-based buffer overflow in received_data execute code, allowing an attacker to crash the application by sending the HTTP requests to the gweb component.
received_data
gweb
bugzilla.suse.com/show_bug.cgi?id=1200189
lore.kernel.org/connman/[email protected]/
security-tracker.debian.org/tracker/CVE-2022-32292
www.debian.org/security/2022/dsa-5231