summaryrefslogtreecommitdiffstats
path: root/scripts/lib/devtool/runqemu.py
diff options
context:
space:
mode:
authorPraveen Kumar <praveen.kumar@windriver.com>2025-05-07 06:51:15 +0000
committerSteve Sakoman <steve@sakoman.com>2025-05-14 09:08:57 -0700
commit86ea2699ac0e8fddcd5b03e71e05556fe466627d (patch)
tree1ac00ff9040a122081a767226e71656f3d6bdc4b /scripts/lib/devtool/runqemu.py
parente4df627b2267cd1f4259db2aaf813fbdac33b311 (diff)
downloadpoky-86ea2699ac0e8fddcd5b03e71e05556fe466627d.tar.gz
connman :fix CVE-2025-32743
In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-32743 Upstream-patch: https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d90b911f6760959bdf1393c39fe8d1118315490f (From OE-Core rev: 9558ec2091964556b47b0909c5d243aee5bafb6f) Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib/devtool/runqemu.py')
0 files changed, 0 insertions, 0 deletions