Bugzilla – Bug 1200190
VUL-0: CVE-2022-32293: connman: Double-free/Use-after-free in WISPR
Last modified: 2022-09-30 19:19:17 UTC
Mitre has assigned CVE-2022-32293.
The following codestreams will require a fix after the embargo has been lifted: - openSUSE:Backports:SLE-15-SP3:Update - openSUSE:Backports:SLE-15-SP4:Update - openSUSE:Factory
Fix posted upstream https://lore.kernel.org/connman/20220801080043.4861-3-wagi@monom.org/ https://lore.kernel.org/connman/20220801080043.4861-1-wagi@monom.org/
This is an autogenerated message for OBS integration: This bug (1200190) was mentioned in https://build.opensuse.org/request/show/992043 Backports:SLE-15-SP3 / connman https://build.opensuse.org/request/show/992048 Backports:SLE-15-SP4 / connman
openSUSE-SU-2022:10076-1: An update that fixes two vulnerabilities is now available. Category: security (critical) Bug References: 1200189,1200190 CVE References: CVE-2022-32292,CVE-2022-32293 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): connman-1.41-bp154.2.3.1
ask mitre to publish the CVE. factory submission missing perhapsd?
I've updated Factory as well: https://build.opensuse.org/package/view_file/openSUSE:Factory/connman/connman.changes?expand=1 In fact it got merged on the very same day of the public release.
weird, verified bsc is mentioned in changes in Factory. -> done
openSUSE-SU-2022:10134-1: An update that fixes two vulnerabilities is now available. Category: security (critical) Bug References: 1200189,1200190 CVE References: CVE-2022-32292,CVE-2022-32293 JIRA References: Sources used: openSUSE Backports SLE-15-SP3 (src): connman-1.41-bp153.2.6.1