• Bug#1102193: connman: CVE-2025-32366

    From Salvatore Bonaccorso@21:1/5 to All on Sun Apr 6 11:00:01 2025
    Source: connman
    Version: 1.43-1
    Severity: important
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for connman.

    CVE-2025-32366[0]:
    | In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length
    | that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen)
    | and memcpy(response+offset,*end,*rdlen).


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-32366
    https://www.cve.org/CVERecord?id=CVE-2025-32366

    Please adjust the affected versions in the BTS as needed.

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)