]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
connman :fix CVE-2025-32743
authorPraveen Kumar <praveen.kumar@windriver.com>
Wed, 7 May 2025 11:48:58 +0000 (11:48 +0000)
committerSteve Sakoman <steve@sakoman.com>
Wed, 7 May 2025 15:42:57 +0000 (08:42 -0700)
commitece0fb01bf28fa114f0a6e479491b4b6f565c80c
treede86e76bd449a397eee3a8530be5fbde892e45e9
parent5c9f3c244971aadee65a98d83668e3d5d63825a0
connman :fix CVE-2025-32743

In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c
can be NULL or an empty string when the TC (Truncated) bit is set in
a DNS response. This allows attackers to cause a denial of service
(application crash) or possibly execute arbitrary code, because those
lookup values lead to incorrect length calculations and incorrect
memcpy operations.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-32743

Upstream-patch:
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f

Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/connman/connman/CVE-2025-32743.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman_1.41.bb