Debian Patches
Status for connman/1.44-3
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update | 
|---|---|---|---|---|---|---|
| 01-init-script-lsb-headers.patch | connman: Missing LSB header in init.d script | Petter Reinholdtsen <pere@hungry.com> | not-needed | debian | ||
| 02-systemd-service-file-shutdown-problems.patch | Prevent systemd service file shutdown problems Silence lintian warnings about, read more at https://lintian.debian.org/tags/systemd-service-file-shutdown-problems.html | Alf Gaida <agaida@siduction.org> | not-needed | 2019-05-01 | ||
| CVE-2025-32743.patch | dnsproxy: Fix NULL/empty lookup causing potential crash In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations. This patch includes a check to make sure loookup value is valid before using it. This helps avoid unexpected value when the input is empty or incorrect. | Praveen Kumar <praveen.kumar@windriver.com> | not-needed | debian | upstream, https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f | 2025-04-24 | 
| CVE-2025-32366.patch | dnsproxy: Address CVE-2025-32366 vulnerability In Connman parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value (i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen)). Here, rdlen may be larger than the amount of remaining packet data in the current state of parsing. As a result, values of stack memory locations may be sent over the network in a response. This patch adds a check to ensure that (*end + *rdlen) does not exceed the valid range. If the condition is violated, the function returns -EINVAL. | "신윤제(학부생-소프트웨어전공)" <ioerts@kookmin.ac.kr> | not-needed | debian | upstream, https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=8d3be0285f1d4667bfe85dba555c663eb3d704b4 | 2025-05-12 | 
