{"id":"CVE-2022-32293","details":"In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.","modified":"2026-03-15T22:45:13.989617Z","published":"2022-08-03T14:15:08.667Z","related":["MGASA-2022-0319","openSUSE-SU-2022:10076-1","openSUSE-SU-2022:10134-1","openSUSE-SU-2024:12221-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202310-21"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5231"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1200190"},{"type":"FIX","url":"https://lore.kernel.org/connman/20220801080043.4861-1-wagi%40monom.org/"},{"type":"FIX","url":"https://lore.kernel.org/connman/20220801080043.4861-3-wagi%40monom.org/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32293.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.41"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.41"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}