In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
{ "binaries": [ { "binary_version": "1.42-5build3", "binary_name": "connman" }, { "binary_version": "1.42-5build3", "binary_name": "connman-dev" }, { "binary_version": "1.42-5build3", "binary_name": "connman-tests" }, { "binary_version": "1.42-5build3", "binary_name": "connman-vpn" } ] }