File _patchinfo of Package patchinfo
<patchinfo incident="17375"> <issue tracker="bnc" id="1194175">VUL-0: CVE-2022-23097: connman: Invalid memory reference in `strnlen` call in `forward_dns_reply()`</issue> <issue tracker="bnc" id="1194177">VUL-0: CVE-2022-23098: connman: dnsproxy TCP Receive Path Triggers 100 % CPU loop if DNS server does not Send Back Data</issue> <issue tracker="bnc" id="1194176">VUL-0: CVE-2022-23096: connman: dnsproxy TCP Receive Path does not Check for Presence of Sufficient Header Data</issue> <issue tracker="cve" id="2022-23098"/> <issue tracker="cve" id="2022-23097"/> <issue tracker="cve" id="2022-23096"/> <packager>wagi</packager> <rating>important</rating> <category>security</category> <summary>Security update for connman</summary> <description>This update for connman fixes the following issues: Update to 1.41: (boo#1194177, boo#1194176, boo#1194175) * Fix issue with RTNL netlink message alignment. * Fix issue with dnsproxy and timeout for TCP feature. (CVE-2022-23097, CVE-2022-23096) * Fix issue with dnsproxy and busy loop in TCP server. (CVE-2022-23098) * Fix issue with WiFi connection with no passphrase. * Add support for wpa_supplicant and WPA3-SAE functionality. * Add support for D-Bus ObjectManager interface. - Add systemd hardening configuration - Disabled openconnect plugin due to version conflict - Disabled vpnc plugin for i568 missing dependency - Disabled hh2serial and tist_working for ppc64le due to version conflict </description> </patchinfo>