Package: connman
Severity: grave
Tags: security

CVE-2012-2320:  Conman doesn't check for the origin of netlink messages (from
https://bugzilla.novell.com/show_bug.cgi?id=715172#c4)
http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=c1b968984212b46bea1330f5ae029507b9bfded9
http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618

CVE-2012-2321: Check hostname validity prior setting the hostname in loopback 
plug-in: (from
https://bugzilla.novell.com/show_bug.cgi?id=715172#c4)
http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=26ace5c59f790bce0f1988b88874c6f2c480fd5a
http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911

CVE-2012-2322: DHCPv6 option parsing vulnerable to DoS (endless loop): (from
https://bugzilla.novell.com/show_bug.cgi?id=715172#c9)
http://lists.connman.net/pipermail/connman/2012-May/009473.html

Since this package is effectively unmaintained (no upload later than 2010 and 
waaaay behind
upstream I suggest to simply remove it for Wheezy?)

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to