File _patchinfo of Package patchinfo

<patchinfo incident="17375">
  <issue tracker="bnc" id="1194175">VUL-0: CVE-2022-23097: connman: Invalid memory reference in `strnlen` call in `forward_dns_reply()`</issue>
  <issue tracker="bnc" id="1194177">VUL-0: CVE-2022-23098: connman: dnsproxy TCP Receive Path Triggers 100 % CPU loop if DNS server does not Send Back Data</issue>
  <issue tracker="bnc" id="1194176">VUL-0: CVE-2022-23096: connman: dnsproxy TCP Receive Path does not Check for Presence of Sufficient Header Data</issue>
  <issue tracker="cve" id="2022-23098"/>
  <issue tracker="cve" id="2022-23097"/>
  <issue tracker="cve" id="2022-23096"/>
  <packager>wagi</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for connman</summary>
  <description>This update for connman fixes the following issues:

Update to 1.41: (boo#1194177, boo#1194176, boo#1194175)

* Fix issue with RTNL netlink message alignment.
* Fix issue with dnsproxy and timeout for TCP feature. (CVE-2022-23097, CVE-2022-23096)
* Fix issue with dnsproxy and busy loop in TCP server. (CVE-2022-23098)
* Fix issue with WiFi connection with no passphrase.
* Add support for wpa_supplicant and WPA3-SAE functionality.
* Add support for D-Bus ObjectManager interface.
- Add systemd hardening configuration
- Disabled openconnect plugin due to version conflict
- Disabled vpnc plugin for i568 missing dependency
- Disabled hh2serial and tist_working for ppc64le due to version conflict
</description>
</patchinfo>
openSUSE Build Service is sponsored by