First published: Tue Feb 09 2021(Updated: )
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Connman | <1.39 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.2 | |
debian/connman | 1.36-2.1~deb10u2 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 | |
ubuntu/connman | <1.36-2.1 | 1.36-2.1 |
ubuntu/connman | <1.21-1.2+ | 1.21-1.2+ |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26676 is a vulnerability in gdhcp in ConnMan before version 1.39 that could be used by network-adjacent attackers to leak sensitive stack information.
CVE-2021-26676 can be exploited by network-adjacent attackers to leak sensitive stack information, which can then be used to further exploit bugs in gdhcp.
ConnMan versions before 1.39 are affected by CVE-2021-26676.
For Debian, updating to ConnMan version 1.41-3 or higher will remedy CVE-2021-26676.
The remedy for CVE-2021-26676 in Ubuntu depends on the specific version. Please refer to the provided references for more information.