]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
connman: Fix CVE-2025-32743
authorPraveen Kumar <praveen.kumar@windriver.com>
Wed, 7 May 2025 06:48:23 +0000 (06:48 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Mon, 12 May 2025 09:52:52 +0000 (10:52 +0100)
commit610056dccc7144a70bcf69aec720b44bc7de7557
tree66f3232240036bec28da91d6a308762f6bf511c4
parentb16c9a295d5d2c5d2100bce11fffeae6beb766c5
connman: Fix CVE-2025-32743

In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c
can be NULL or an empty string when the TC (Truncated) bit is set in
a DNS response. This allows attackers to cause a denial of service
(application crash) or possibly execute arbitrary code, because those
lookup values lead to incorrect length calculations and incorrect
memcpy operations.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-32743

Upstream-patch:
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f

Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/connman/connman/CVE-2025-32743.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman_1.44.bb