CVE-2022-23098

HIGH

Intel Connman < 1.40 - Infinite Loop

Title source: rule
STIX 2.1

Description

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

References (5)

Core 5
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2022/dsa-5231
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202310-21
Exploit, Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/01/25/1

Scores

CVSS v3 7.5
EPSS 0.0008
EPSS Percentile 23.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-835
Status published
Products (3)
debian/debian_linux 9.0
debian/debian_linux 11.0
intel/connman < 1.40
Published Jan 28, 2022
Tracked Since Feb 18, 2026