An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/network/connman/connman.git/log/ | third party advisory product |
https://www.openwall.com/lists/oss-security/2022/01/25/1 | mailing list exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5231 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202310-21 | third party advisory vendor advisory |