| Name | CVE-2021-26676 |
| Description | gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-2552-1, DSA-4847-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| connman (PTS) | bullseye (security), bullseye | 1.36-2.2+deb11u2 | fixed |
| bookworm | 1.41-3 | fixed | |
| trixie | 1.44-3 | fixed | |
| forky, sid | 1.45-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| connman | source | stretch | 1.33-3+deb9u2 | DLA-2552-1 | ||
| connman | source | buster | 1.36-2.1~deb10u1 | DSA-4847-1 | ||
| connman | source | (unstable) | 1.36-2.1 |
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1