Package: connman X-Debbugs-CC: t...@security.debian.org secure-testing- t...@lists.alioth.debian.org Severity: grave Version: 1.33-3 Tags: security patch
Hi, the following vulnerability was published for connman. CVE-2017-12865[0]: stack overflow in dns proxy feature If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. The commit that fix the vulnerability can be found here: https:// git.kernel.org/pub/scm/network/connman/connman.git/commit/? id=5c281d182ecdd0a424b64f7698f32467f8f67b71 The vulnerability was fixed in 1.35, therefore sid and buster are not affected. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-12865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12865 Please adjust the affected versions in the BTS as needed.