]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
connman :fix CVE-2025-32743
authorPraveen Kumar <praveen.kumar@windriver.com>
Thu, 8 May 2025 16:39:10 +0000 (16:39 +0000)
committerSteve Sakoman <steve@sakoman.com>
Thu, 8 May 2025 20:19:12 +0000 (13:19 -0700)
commit61610f57c6b9ee2b6002decc037db049e9ddfe51
tree8346d1e571f96423ec2de54f592c368cf935c8d8
parent75f1c57a5171859d1bfc58d69b3923d017b14303
connman :fix CVE-2025-32743

In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c
can be NULL or an empty string when the TC (Truncated) bit is set in
a DNS response. This allows attackers to cause a denial of service
(application crash) or possibly execute arbitrary code, because those
lookup values lead to incorrect length calculations and incorrect
memcpy operations.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-32743

Upstream-patch:
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f

Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/connman/connman/CVE-2025-32743.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman_1.43.bb