SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for connman-1.42-3.1.x86_64.rpm :

* Thu Feb 08 2024 Dominique Leuenberger - Change all hashbangs of test scripts from /usr/bin/python to /usr/bin/python3: the code is py3 ready (boo#1219309, commit 55965561).
* Mon Nov 13 2023 Daniel Wagner - Update to 1.42
* Fix issue with iwd and signal strength calculation.
* Fix issue with iwd and handling service removal.
* Fix issue with iwd and handling new connections.
* Fix issue with handling default online check URL.
* Fix issue with handling nameservers refresh.
* Fix issue with handling proxy from DHCP lease. (bsc#1210395 CVE-2023-28488)
* Fix issue with handling multiple proxies from PAC.
* Fix issue with handling manual time update changes.
* Fix issue with handling invalid gateway routes.
* Fix issue with handling hidden WiFi agent requests.
* Fix issue with handling WiFi SAE authentication failure.
* Fix issue with handling DNS Proxy and TCP server replies.
* Add support for regulatory domain following timezone.
* Add support for localtime configuration option.
* add 0001-scripts-add-missing-header-file.patch- remove patches
* remove 0001-wispr-Rename-wispr_portal_list-to-wispr_portal_hash.patch
* remove 0002-wispr-Ignore-NULL-proxy.patch
* remove 0003-wispr-Add-reference-counter-to-portal-context.patch
* remove 0004-wispr-Update-portal-context-references.patch
* remove 0005-gweb-Fix-OOB-write-in-received_data.patch
* Mon Aug 01 2022 Daniel Wagner - Add refcounting to wispr portal detection (bsc#1200190)
* add 0001-wispr-Rename-wispr_portal_list-to-wispr_portal_hash.patch
* add 0002-wispr-Ignore-NULL-proxy.patch
* add 0003-wispr-Add-reference-counter-to-portal-context.patch (CVE-2022-32293)
* add 0004-wispr-Update-portal-context-references.patch (CVE-2022-32293)- Fix OOB write in received_data (bsc#1200189)
* add 0005-gweb-Fix-OOB-write-in-received_data.patch (CVE-2022-32292)
* Thu Jul 14 2022 Daniel Wagner - Switch from iptables to nftables.
* Thu May 12 2022 Dominique Leuenberger - Explicitly BuildRequire openconnect: configure is looking for the binaries, not only the devel parts. The devel package though does not pull in the daemon (which is not used in most cases to develop).
* Tue Feb 01 2022 Daniel Wagner - Update to 1.41: (bsc#1194177, bsc#1194176, bsc#1194175)
* Fix issue with RTNL netlink message alignment.
* Fix issue with dnsproxy and timeout for TCP feature. (CVE-2022-23097, CVE-2022-23096)
* Fix issue with dnsproxy and busy loop in TCP server. (CVE-2022-23098)
* Fix issue with WiFi connection with no passphrase.
* Add support for wpa_supplicant and WPA3-SAE functionality.
* Add support for D-Bus ObjectManager interface.- Renamed downstream patches to separate them from upstream patches
* Rename 0001-connman-1.35-service.patch to 0100-connman-1.35-service.patch
* Rename harden_connman-vpn.service.patch to 0101-harden_connman-vpn.service.patch
* Rename harden_connman-wait-online.service.patch to 0102-harden_connman-wait-online.service.patch
* Fri Nov 26 2021 Danilo Spinella - connman-nmcompat manages D-Bus permissions for NetworkManager service. However, these rules are different than the ones NetworkManager setup. Allow the installation of only either of them. Fixes bsc#1192827
* Fri Oct 15 2021 Johannes Segitz - Drop ProtectClock hardening, can cause issues if other device acceess is needed
* Mon Aug 30 2021 Johannes Segitz - Added hardening to systemd service(s). Added patch(es):
* harden_connman-vpn.service.patch
* harden_connman-wait-online.service.patch
* Mon Aug 23 2021 Daniel Wagner - Update to 1.40:
* Fix issue with handling WiFi disconnecting status.
* Fix issue with handling WiFi auto-connect and iwd backend.
* Drop 0002-dnsproxy-Check-the-length-of-buffers-before-memcpy.patch
* Wed Jun 09 2021 Daniel Wagner - Address buffer overflow in dnsproxy (bsc#1186869):
* Rename connman-1.35-service.patch to 0001-connman-1.35-service.patch
* Add 0002-dnsproxy-Check-the-length-of-buffers-before-memcpy.patch (CVE-2021-33833)
* Fri Feb 12 2021 Paolo Stivanin - Update to 1.39 (bsc#1181751):
* Fix issue with scanning state synchronization and iwd.
* Fix issue with invalid key with 4-way handshake offloading.
* Fix issue with DNS proxy length checks to prevent buffer overflow. (CVE-2021-26675)
* Fix issue with DHCP leaking stack data via uninitialized variable. (CVE-2021-26676)
 
ICM