* [Buildroot] [PATCH] connman: security bump to version 1.35
@ 2017-08-28 18:16 Baruch Siach
2017-08-29 21:12 ` Thomas Petazzoni
2017-09-06 11:13 ` Peter Korsgaard
0 siblings, 2 replies; 3+ messages in thread
From: Baruch Siach @ 2017-08-28 18:16 UTC (permalink / raw)
To: buildroot
Fixes CVE-2017-12865: stack overflow in dns proxy feature.
Cc: Martin Bark <martin@barkynet.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
---
package/connman/connman.hash | 2 +-
package/connman/connman.mk | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/connman/connman.hash b/package/connman/connman.hash
index e6485b93a61d..c822bb1fe4f5 100644
--- a/package/connman/connman.hash
+++ b/package/connman/connman.hash
@@ -1,2 +1,2 @@
# From https://www.kernel.org/pub/linux/network/connman/sha256sums.asc
-sha256 a9a0808c729c1f348fc36d8cecb52d19b72bc34cb411c502608cb0e0190fc71e connman-1.34.tar.xz
+sha256 66d7deb98371545c6e417239a9b3b3e3201c1529d08eedf40afbc859842cf2aa connman-1.35.tar.xz
diff --git a/package/connman/connman.mk b/package/connman/connman.mk
index 4c19b4b98a86..52c45451d902 100644
--- a/package/connman/connman.mk
+++ b/package/connman/connman.mk
@@ -4,7 +4,7 @@
#
################################################################################
-CONNMAN_VERSION = 1.34
+CONNMAN_VERSION = 1.35
CONNMAN_SOURCE = connman-$(CONNMAN_VERSION).tar.xz
CONNMAN_SITE = $(BR2_KERNEL_MIRROR)/linux/network/connman
CONNMAN_DEPENDENCIES = libglib2 dbus iptables
--
2.14.1
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] connman: security bump to version 1.35
2017-08-28 18:16 [Buildroot] [PATCH] connman: security bump to version 1.35 Baruch Siach
@ 2017-08-29 21:12 ` Thomas Petazzoni
2017-09-06 11:13 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Thomas Petazzoni @ 2017-08-29 21:12 UTC (permalink / raw)
To: buildroot
Hello,
On Mon, 28 Aug 2017 21:16:51 +0300, Baruch Siach wrote:
> Fixes CVE-2017-12865: stack overflow in dns proxy feature.
>
> Cc: Martin Bark <martin@barkynet.com>
> Signed-off-by: Baruch Siach <baruch@tkos.co.il>
> ---
> package/connman/connman.hash | 2 +-
> package/connman/connman.mk | 2 +-
> 2 files changed, 2 insertions(+), 2 deletions(-)
Applied to master, thanks. I have to say I was a bit surprised to not
see this CVE mentioned on the Connman page about the 1.35 release. But
indeed, Debian says it has been fixed in 1.35, and there is a fix for a
crash in dnsproxy.c, which matches the CVE.
Upstream could be a little bit clearer though. Or maybe the CVE was
filled after 1.35 was released ?
Thomas
--
Thomas Petazzoni, CTO, Free Electrons
Embedded Linux, Kernel and Android engineering
http://free-electrons.com
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] connman: security bump to version 1.35
2017-08-28 18:16 [Buildroot] [PATCH] connman: security bump to version 1.35 Baruch Siach
2017-08-29 21:12 ` Thomas Petazzoni
@ 2017-09-06 11:13 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2017-09-06 11:13 UTC (permalink / raw)
To: buildroot
>>>>> "Baruch" == Baruch Siach <baruch@tkos.co.il> writes:
> Fixes CVE-2017-12865: stack overflow in dns proxy feature.
> Cc: Martin Bark <martin@barkynet.com>
> Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Committed to 2017.02.x, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2017-09-06 11:13 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-08-28 18:16 [Buildroot] [PATCH] connman: security bump to version 1.35 Baruch Siach
2017-08-29 21:12 ` Thomas Petazzoni
2017-09-06 11:13 ` Peter Korsgaard
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.