]> code.ossystems Code Review - openembedded-core.git/commit
connman: fix CVE-2021-26675, CVE-2021-26676
authorCatalin Enache <catalin.enache@windriver.com>
Tue, 23 Mar 2021 23:37:57 +0000 (19:37 -0400)
committerSteve Sakoman <steve@sakoman.com>
Mon, 29 Mar 2021 17:59:51 +0000 (07:59 -1000)
commit3c78000aaf8e4ee8ffb7674f5c286e2c110f167b
tree2faac0de40f6e29269fc3e1fbe1e91914a4ce517
parent707036d4ec12ef1a260adcef78627b26e32e6540
connman: fix CVE-2021-26675, CVE-2021-26676

A stack-based buffer overflow in dnsproxy in ConnMan before 1.39
could be used by network adjacent attackers to execute code.

gdhcp in ConnMan before 1.39 could be used by network-adjacent.
attackers to leak sensitive stack information, allowing further
exploitation of bugs in gdhcp.

References:
https://nvd.nist.gov/vuln/detail/CVE-2021-26675
https://nvd.nist.gov/vuln/detail/CVE-2021-26676

Upstream patches:
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1

Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/connman/connman/CVE-2021-26675.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman/CVE-2021-26676-0001.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman/CVE-2021-26676-0002.patch [new file with mode: 0644]
meta/recipes-connectivity/connman/connman_1.37.bb