An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
| Software | From | Fixed in |
|---|---|---|
| intel / connman | - | 1.40.x |
| debian / debian_linux | 9.0 | 9.0.x |
| debian / debian_linux | 11.0 | 11.0.x |