Format: 1.8 Date: Tue, 27 Jun 2023 16:39:51 +0200 Source: connman Binary: connman connman-dev connman-vpn Architecture: s390x Version: 1.36-2ubuntu0.1 Distribution: focal Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Fabian Toepfer Description: connman - Intel Connection Manager daemon connman-dev - Development files for connman connman-vpn - Intel Connection Manager daemon - VPN daemon Changes: connman (1.36-2ubuntu0.1) focal-security; urgency=medium . * SECURITY UPDATE: Stack-based buffer overflow - debian/patches/dnsproxy-Add-length-checks-to-prevent-buffer-overflo.patch: Add length checks to prevent buffer overflow. - CVE-2021-26675 * SECURITY UPDATE: Sensitive information exposure - debian/patches/gdhcp-Avoid-reading-invalid-data-in-dhcp_get_option.patch: Avoid reading invalid data in dhcp_get_option - debian/patches/gdhcp-Avoid-leaking-stack-data-via-unitiialized-vari.patch: Avoid leaking stack data via unitiialized variable. - CVE-2021-26676 * SECURITY UPDATE: Stack-based buffer overflow - debian/patches/dnsproxy-Check-the-length-of-buffers-before-memcpy.patch: Check the length of buffers before memcpy. - CVE-2021-33833 * SECURITY UPDATE: Out-of-bounds read - debian/patches/dnsproxy-Simplify-udp_server_event.patch: Simplify udp_server_event() - debian/patches/dnsproxy-Validate-input-data-before-using-them.patch: Validate input data before using them. - CVE-2022-23096 - CVE-2022-23097 * SECURITY UPDATE: Denial-of-service - debian/patches/dnsproxy-Avoid-100-busy-loop-in-TCP-server-case.patch: Avoid 100 % busy loop in TCP server case. - debian/patches/dnsproxy-Keep-timeout-in-TCP-case-even-after-connect.patch: Keep timeout in TCP case even after connection is established. - CVE-2022-23098 * SECURITY UPDATE: Heap-based buffer overflow - debian/patches/gweb-Fix-OOB-write-in-received_data.patch: Fix OOB write in received_data(). - CVE-2022-32292 * SECURITY UPDATE: Use-after-free - debian/patches/wispr-Add-reference-counter-to-portal-context.patch: Add reference counter to portal context. - debian/patches/wispr-Update-portal-context-references.patch: Update portal context references. - CVE-2022-32293 * SECURITY UPDATE: Stack-based buffer overflow - debian/patches/CVE-2023-28488.patch: Verify and sanitize packet length first. - CVE-2023-28488 Checksums-Sha1: d38ea203a690340d049327227f8122ba14390e40 1522256 connman-dbgsym_1.36-2ubuntu0.1_s390x.ddeb c62ae4b3fd8519eb3b0c9f069cf446d41716be54 11848 connman-dev_1.36-2ubuntu0.1_s390x.deb 57918fcca99a1db10972b57026acbfd78a90a603 470492 connman-vpn-dbgsym_1.36-2ubuntu0.1_s390x.ddeb c581f732497fbfd1d1486946d455731f0217e934 102024 connman-vpn_1.36-2ubuntu0.1_s390x.deb a635e4cf2f82ef6db7f14654ed93e480a921fad9 9478 connman_1.36-2ubuntu0.1_s390x.buildinfo 3c6bbc20977f731341c9e09e4c3dc0ea0ddaffee 348396 connman_1.36-2ubuntu0.1_s390x.deb Checksums-Sha256: 2f7e0e71fd0d5bedee435d9a96632849d6666d20c371aa5456ace8ca4cfb9095 1522256 connman-dbgsym_1.36-2ubuntu0.1_s390x.ddeb baf05e8e072bf1bab75231af6a39e669524afc00c7681c4605410abbadddabe3 11848 connman-dev_1.36-2ubuntu0.1_s390x.deb 5d3af57fe5600a4faa195ea6b9da9a279b26e2436da5ad71ed9e67923a65c927 470492 connman-vpn-dbgsym_1.36-2ubuntu0.1_s390x.ddeb 9d1c777eb1034db0b6c594afb8567e3f76e4acac81ebc0697f4bd8db46b45d3d 102024 connman-vpn_1.36-2ubuntu0.1_s390x.deb 9d4c11c4fae628c8767fad5f3f37c784a6159eb5118095d37b1059c63ffdfdb5 9478 connman_1.36-2ubuntu0.1_s390x.buildinfo 551a3fd861280665346529e254f0c1d72c07f25f496c940c65a23288b4328f13 348396 connman_1.36-2ubuntu0.1_s390x.deb Files: 4e0396bad26e9a60cedb347fff33d30f 1522256 debug optional connman-dbgsym_1.36-2ubuntu0.1_s390x.ddeb c039722a2d09c8e9e2bf5516ad52293b 11848 devel optional connman-dev_1.36-2ubuntu0.1_s390x.deb 027f54d86a40f47e3b2c3ae33cf204cf 470492 debug optional connman-vpn-dbgsym_1.36-2ubuntu0.1_s390x.ddeb de003f5ced7cf4e5c1298db43af322e8 102024 net optional connman-vpn_1.36-2ubuntu0.1_s390x.deb b806cee1072e5e0d1555f4eeaf2eb950 9478 net optional connman_1.36-2ubuntu0.1_s390x.buildinfo 5904f4a05b389b35c72188e142a6d64f 348396 net optional connman_1.36-2ubuntu0.1_s390x.deb Original-Maintainer: Alexander Sack