Zwei Probleme in ConnMan
ID: | 201812-02 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | So, 2. Dezember 2018, 23:16 |
Referenzen: | https://nvd.nist.gov/vuln/detail/CVE-2017-12865
https://nvd.nist.gov/vuln/detail/CVE-2017-5716 |
Applikationen: | ConnMan |
Originalnachricht |
|
--/WwmFnJnmDyWGHa4 Content-Type: text/plain; charset=utf-8 Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201812-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: ConnMan: Multiple vulnerabilities Date: December 02, 2018 Bugs: #628566, #630028 ID: 201812-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in ConnMan, the worst of which could result in the remote execution of code. Background ========== ConnMan provides a daemon for managing Internet connections. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/connman < 1.35-r1 >= 1.35-r1 Description =========== Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker, via a crafted DNS packet, could remotely execute code or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All ConnMan users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.35-r1" References ========== [ 1 ] CVE-2017-12865 https://nvd.nist.gov/vuln/detail/CVE-2017-12865 [ 2 ] CVE-2017-5716 https://nvd.nist.gov/vuln/detail/CVE-2017-5716 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201812-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --/WwmFnJnmDyWGHa4 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAlwD/n0ACgkQpRQw84X1 dt0xsAf9Etw0yRZZPC+XRi2ydzRYiNRxNNASQzw3bsI2mCCyfkB5twQXCJXx44fO HuWVWNJOTMdIUuj1N+mDaXNJjByhH8aN74c0A9YAdDT85kWilpv+GiqojZ5Wm3KD csm5HstliPKkZzclnJzz/yB6DmkBKAGpBa2F+M8kMTVkYLLV6Naep3yXoTeSqcSg zOfGLweq4T2Ya/yr7Hci4vGKggYiAjzYQhB1aFIN7jntV+jOOsdLxSqH0i/u5Q2v qMGvK0HeXl9Vl7Aa3uM7zDRkI5vOFgemuqXqxCgjLM7RRYRmJH5fUjbw4nYDr17n jY1KJB/fYHR7EugqceP6ivrdKAanVQ== =nFtJ -----END PGP SIGNATURE----- --/WwmFnJnmDyWGHa4-- |