]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
connman :fix CVE-2025-32743
authorPraveen Kumar <praveen.kumar@windriver.com>
Wed, 7 May 2025 06:51:15 +0000 (06:51 +0000)
committerSteve Sakoman <steve@sakoman.com>
Wed, 7 May 2025 15:39:39 +0000 (08:39 -0700)
commit9558ec2091964556b47b0909c5d243aee5bafb6f
treee98036c82258766f0b3058d7797bf7a73259ebdb
parent90359036300731b6c26b646afbf3d66127b72fa2
connman :fix CVE-2025-32743

In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c
can be NULL or an empty string when the TC (Truncated) bit is set in
a DNS response. This allows attackers to cause a denial of service
(application crash) or possibly execute arbitrary code, because those
lookup values lead to incorrect length calculations and incorrect
memcpy operations.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-32743

Upstream-patch:
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f

Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/connman/connman/CVE-2025-32743.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman_1.42.bb