{"id":"CVE-2022-32292","details":"In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.","modified":"2026-04-16T04:30:43.155230957Z","published":"2022-08-03T14:15:08.620Z","related":["openSUSE-SU-2022:10076-1","openSUSE-SU-2022:10134-1","openSUSE-SU-2024:12221-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202310-21"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5231"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1200189"},{"type":"FIX","url":"https://lore.kernel.org/connman/20220801080043.4861-5-wagi%40monom.org/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.41"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.41"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32292.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}