Your message dated Thu, 07 Sep 2017 21:17:08 +0000
with message-id <e1dq4ae-0005ox...@fasolo.debian.org>
and subject line Bug#872844: fixed in connman 1.33-3+deb9u1
has caused the Debian Bug report #872844,
regarding connman: [CVE-2017-12865] stack overflow in dns proxy feature
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
872844: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872844
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: connman
X-Debbugs-CC: t...@security.debian.org secure-testing-
t...@lists.alioth.debian.org
Severity: grave
Version: 1.33-3
Tags: security patch
Hi,
the following vulnerability was published for connman.
CVE-2017-12865[0]:
stack overflow in dns proxy feature
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
The commit that fix the vulnerability can be found here: https://
git.kernel.org/pub/scm/network/connman/connman.git/commit/?
id=5c281d182ecdd0a424b64f7698f32467f8f67b71
The vulnerability was fixed in 1.35, therefore sid and buster are not
affected.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-12865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12865
Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: connman
Source-Version: 1.33-3+deb9u1
We believe that the bug you reported is fixed in the latest version of
connman, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 872...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Luciano Bello <luci...@debian.org> (supplier of updated connman package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 23 Aug 2017 10:25:30 -0400
Source: connman
Binary: connman connman-vpn connman-dev connman-doc
Architecture: source amd64 all
Version: 1.33-3+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Alexander Sack <a...@debian.org>
Changed-By: Luciano Bello <luci...@debian.org>
Description:
connman - Intel Connection Manager daemon
connman-dev - Development files for connman
connman-doc - ConnMan documentation
connman-vpn - Intel Connection Manager daemon - VPN daemon
Closes: 872844
Changes:
connman (1.33-3+deb9u1) stretch-security; urgency=high
.
* Non-maintainer upload by the Security Team.
* CVE-2017-12865: Fix crash on malformed DNS response (Closes: #872844)
Checksums-Sha1:
2973809c20cfe8a79a32c76b959885cd77e9ba4b 2362 connman_1.33-3+deb9u1.dsc
cd5fa114a3148f74953c5722022d36bb97e8d14a 958059 connman_1.33.orig.tar.gz
339c7788e6154ff3fb8279b677c8b7e4d9a086d4 12720
connman_1.33-3+deb9u1.debian.tar.xz
e9665dd87130ec31d03854cba5d7e94e5058f81a 1249786
connman-dbgsym_1.33-3+deb9u1_amd64.deb
df1832656f32b54704f83cffb2c5dc2d4fdf92c9 26898
connman-dev_1.33-3+deb9u1_amd64.deb
dc40c554eebc65cc492bd78aeb7c309970cab338 62332
connman-doc_1.33-3+deb9u1_all.deb
551bdaa26c3934bcf1b87628895683b93cc8dbc6 398600
connman-vpn-dbgsym_1.33-3+deb9u1_amd64.deb
e23ba31c96bb498f2ec7dcdde0a7ae8d11207966 122800
connman-vpn_1.33-3+deb9u1_amd64.deb
fb5dc24369f9ea6471ca82478a0c635112e2da38 9315
connman_1.33-3+deb9u1_amd64.buildinfo
d1dccabaf7096ee51d5e31e05b7eb5513139be54 389784 connman_1.33-3+deb9u1_amd64.deb
Checksums-Sha256:
0bc1bbcdad34144b6a643e684154fcf938a41f55b1eec4fcccb9492e49806ac0 2362
connman_1.33-3+deb9u1.dsc
5a9abae1573fa367269df8bd92792de407fd15c7ac6c1448d07a24a5d6b5b831 958059
connman_1.33.orig.tar.gz
82add34e73aa3eb8031d11be5180c6d23471547757b458448de8c095b6cc2d71 12720
connman_1.33-3+deb9u1.debian.tar.xz
99cf9b319635d6f62d3a48cbd571392136cee7be87683be7de8abd751ea1d3d0 1249786
connman-dbgsym_1.33-3+deb9u1_amd64.deb
f9cc2c5e359c661ac38c862806a2fd0b9fa6835a28b856da8316d89f6914e56d 26898
connman-dev_1.33-3+deb9u1_amd64.deb
a17b7e6465eaefd71b4b8c933ecdab1f7646e4b816980746013cad4c6d23da4f 62332
connman-doc_1.33-3+deb9u1_all.deb
ed2347ee6e3ff203894dcc7e8b6db171a5575a888e6861e7b5ba3ea5816899b6 398600
connman-vpn-dbgsym_1.33-3+deb9u1_amd64.deb
14766adfa9a9e4af3c16344962ec3dd1b13277806dc99161f2bea8557b26d9f2 122800
connman-vpn_1.33-3+deb9u1_amd64.deb
bed503b05b9308ad9aae6662ed71eddbf2b327e1f8750f85ce88bf7c8260fde4 9315
connman_1.33-3+deb9u1_amd64.buildinfo
7bbad0ca6f61dfeb703e24977f25e1e9c9cf5c368fe7357e12dace4a6a5dbc30 389784
connman_1.33-3+deb9u1_amd64.deb
Files:
0937bf11dc210cb6c9fe94107d76eded 2362 net optional connman_1.33-3+deb9u1.dsc
48d3e878d31efd4854fc9b66e29622c1 958059 net optional connman_1.33.orig.tar.gz
3427d084c84207f9ed2fee2ef59a3020 12720 net optional
connman_1.33-3+deb9u1.debian.tar.xz
b108262ba5eff77b0e2fac8dd9c05bff 1249786 debug extra
connman-dbgsym_1.33-3+deb9u1_amd64.deb
15f225b4d1506547464069a1f7741a6e 26898 devel optional
connman-dev_1.33-3+deb9u1_amd64.deb
b5467b2fcc0a6aeecf3144ef8ccf8b08 62332 doc optional
connman-doc_1.33-3+deb9u1_all.deb
ef536f052452c802bd90d234b3da8839 398600 debug extra
connman-vpn-dbgsym_1.33-3+deb9u1_amd64.deb
8c1aaa09536c09611a9d2a571fdfe008 122800 net optional
connman-vpn_1.33-3+deb9u1_amd64.deb
fdb03352bc82611465e50f00918ffa79 9315 net optional
connman_1.33-3+deb9u1_amd64.buildinfo
c2bcb220676d15e0f7d71d16f46e0021 389784 net optional
connman_1.33-3+deb9u1_amd64.deb
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEayzFlnvRveqeWJspbsLe9o/+N3QFAlmjO+kACgkQbsLe9o/+
N3QTww/9EU+mG4JYHN20qG5XZh52KEpHqzwcM3PKiIrBFzI/ufJg5lilbPTkNvuD
b8JCL0e1iiNSd3OdVJF9V12v+MMzOUCSFk7vOrWjMXmWKqFLpeZowQBbtFlaGI0j
D0SUphRmxVpuhiD9BExqlYTYvSN4CcM/bRNPLZOjd54oQqzFF/Pm5ZMk3CuELgFj
VgM7kgfD5zdTQW2aycNnDvaMkLGlcIShmuYD3jnqs8w/V3CE/8YAXCyO3UfkaPK5
V+lWCQboBFVxVXM3UNR9hR43k7mUO1mHMUa2k69C+QFwfvsBv13/H6M6Rge/4XWs
AkJoKlQXyraqV6BSF6o3Lto3lA4syglxGt/DFQZ7Gy66sli5wL7ho/0gMnnJJnug
Whmrd/fFca9cGP+9pnTf/tDQZXdHUR6l3YTk37yLTkjGkc3+yZo/m0nW2kMKr4wT
hd/BF0JbqN9xGVlw0ONBG7XOiIozI6sapvmnkpUiGZyZV4+pAG1XOMEAgiTdOTfx
3o6Z4Dks2X6I3gx9rxybXMOegfa1HgkU4KPvHAbcEJrF18mK+jq0wbv8jG/hj14j
+gYDxbMhNJ0yKfWXG+++82x0bWu2izs67BW6R3kzyicUFuPhf6Ivmjls58CucrYw
94ivvCnBgVl25jWYX5iYYOHYL2/t8ddzrITRT6ZYQGJQ3Jyi5bE=
=WsnJ
-----END PGP SIGNATURE-----
--- End Message ---