Explorar el Código

package/connman: security bump to version 1.41

Fixes the following security issues:

- CVE-2022-23096: An issue was discovered in the DNS proxy in Connman
  through 1.40.  The TCP server reply implementation lacks a check for the
  presence of sufficient Header Data, leading to an out-of-bounds read.

- CVE-2022-23097: An issue was discovered in the DNS proxy in Connman
  through 1.40.  forward_dns_reply mishandles a strnlen call, leading to an
  out-of-bounds read.

- CVE-2022-23098: An issue was discovered in the DNS proxy in Connman
  through 1.40.  The TCP server reply implementation has an infinite loop if
  no data is received.

For details, see the advisory:
https://www.openwall.com/lists/oss-security/2022/01/25/1

Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 35a3c018246813597db52ef65b36a295ebdd9285)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
James Hilliard hace 3 años
padre
commit
b9794087bd
Se han modificado 2 ficheros con 2 adiciones y 2 borrados
  1. 1 1
      package/connman/connman.hash
  2. 1 1
      package/connman/connman.mk

+ 1 - 1
package/connman/connman.hash

@@ -1,4 +1,4 @@
 # From https://www.kernel.org/pub/linux/network/connman/sha256sums.asc
-sha256  1a57ae7ce234aa3a1744aac3be5c2121d98dce999440ef8ab9cc4edfd5edcb12  connman-1.40.tar.xz
+sha256  79fb40f4fdd5530c45aa8e592fb16ba23d3674f3a98cf10b89a6576f198de589  connman-1.41.tar.xz
 # Locally computed
 sha256  b499eddebda05a8859e32b820a64577d91f1de2b52efa2a1575a2cb4000bc259  COPYING

+ 1 - 1
package/connman/connman.mk

@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-CONNMAN_VERSION = 1.40
+CONNMAN_VERSION = 1.41
 CONNMAN_SOURCE = connman-$(CONNMAN_VERSION).tar.xz
 CONNMAN_SITE = $(BR2_KERNEL_MIRROR)/linux/network/connman
 CONNMAN_DEPENDENCIES = libglib2 dbus