We have moved to a new Sailfish OS Forum. Please start new discussions there.

Revision history [back]

click to hide/show revision 1
initial version

posted 2017-08-30 12:39:21 +0200

Stack-based buffer overflow in dnsproxy.c in connman 1.34 and ...

Although title mentions only connman v1.34 CVE text lists more (https://security-tracker.debian.org/tracker/CVE-2017-12865), e.g. 1.21, 1.33. This is exploitable when attacker controls Wi-Fi AP (public places, etc.).

It was fixed in connman 1.35. In Jämsänjoki (2.1.1.26) we have conmann 1.31.

Stack-based buffer overflow in dnsproxy.c in connman 1.34 and ...... [CVE-2017-12865]

Although title mentions only connman v1.34 CVE text lists more (https://security-tracker.debian.org/tracker/CVE-2017-12865), e.g. 1.21, 1.33. This is exploitable when attacker controls Wi-Fi AP (public places, etc.).

It was fixed in connman 1.35. In Jämsänjoki (2.1.1.26) we have conmann 1.31.

Stack-based buffer overflow in dnsproxy.c in connman 1.34 and ... [CVE-2017-12865]

Although title mentions only connman v1.34 CVE text lists more (https://security-tracker.debian.org/tracker/CVE-2017-12865), e.g. 1.21, 1.33. This is exploitable when attacker controls Wi-Fi AP (public places, etc.).

It was fixed in connman 1.35. In Jämsänjoki (2.1.1.26) we have conmann 1.31.