Bug 29945 - connman new security issues CVE-2022-2309[6-8]
Summary: connman new security issues CVE-2022-2309[6-8]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-01-25 23:17 CET by David Walser
Modified: 2022-02-02 22:30 CET (History)
5 users (show)

See Also:
Source RPM: connman-1.38-2.1.mga8.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2022-01-25 23:17:45 CET
Security issues in connman have been announced today (January 25):
https://www.openwall.com/lists/oss-security/2022/01/25/1

Fixes are available here:
https://lore.kernel.org/connman/20220125090026.5108-3-wagi@monom.org/T/#m81ef1e357b6b2d3efd53f86d1cdcbfe9a37d8b3f

and have been commited upstream:
https://git.kernel.org/pub/scm/network/connman/connman.git

Mageia 8 is also affected.
David Walser 2022-01-25 23:18:07 CET

Whiteboard: (none) => MGA8TOO
Status comment: (none) => Patches available from upstream
CC: (none) => nicolas.salguero

Comment 1 Lewis Smith 2022-01-26 10:31:07 CET
Various packagers commit this SRPM, so assigning globally (noting that NicolasS is CC'd).

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2022-01-26 11:02:01 CET
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

TCP Receive Path does not Check for Presence of Sufficient Header Data. (CVE-2022-23096)

Possibly invalid memory reference in `strnlen()` call in `forward_dns_reply()`. (CVE-2022-23097)

TCP Receive Path Triggers 100 % CPU loop if DNS server does not Send Back Data. (CVE-2022-23098)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23098
https://www.openwall.com/lists/oss-security/2022/01/25/1
========================

Updated packages in core/updates_testing:
========================
connman-devel-1.38-2.2.mga8
connman-1.38-2.2.mga8

from SRPM:
connman-1.38-2.2.mga8.src.rpm

Version: Cauldron => 8
Status: NEW => ASSIGNED
Whiteboard: MGA8TOO => (none)
Status comment: Patches available from upstream => (none)
Assignee: pkg-bugs => qa-bugs
Source RPM: connman-1.40-1.mga9.src.rpm => connman-1.38-2.1.mga8.src.rpm

Comment 3 Herman Viaene 2022-01-27 14:17:15 CET
MGA8-64 Plasma on Lenovo B50 in Dutch
No installation issues.
Ref bug 28321 Comment 20, got exactly same results.
Also installed econnman,the GUI, run it from CLI and got no connection  working and even worse, it reports errors only to the CLI, and the GUI does onot work properly either (eg in manual mode, you can type in the wanted IP4 address, but the input disappears as you leave the address box).
I sis not take Aurelien's advice to disable the net applet. That might explain the error's, but I'm hopeless to get this ever workiing properly.

CC: (none) => herman.viaene

Comment 4 Thomas Andrews 2022-01-29 00:39:03 CET
MGA8-64 Plasma on AMD Phenom II X4 desktop with Atheros-based wifi. No installation issues here, either.

I'm not familiar with this either. I sought some guidance from DuckDuckGo, and found https://wiki.archlinux.org/title/ConnMan with a brief tutorial on some of the commands. I attempted the same procedure that I tried in bug 28321 Comment 24, with pretty much the same results (after some stumbling with the commands) - and this time I was able to get connman to tell me I was connected to my wifi network.

Also tried in a VirtualBox guest, to simulate a wired connection. This worked very well, none of the stumbling in establishing a wifi connection. 

I like our net_applet and/or Network Manager better, but this looks like it's working as designed. 

Giving it an OK, and Validating. Advisory in Comment 2.

CC: (none) => andrewsfarm, sysadmin-bugs
Whiteboard: (none) => MGA8-64-OK
Keywords: (none) => validated_update

Dave Hodgins 2022-02-02 20:38:17 CET

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 5 Mageia Robot 2022-02-02 22:30:40 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0045.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.