Fix CVE-2021-33833 which is a stack buffer overflow in dnsproxy.
Release notes:
https://lore.kernel.org/connman/
20210610113503.ob45lhssqy5hk4ki@beryllium.lan/
Signed-off-by: John Keeping <john@metanate.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
# From https://www.kernel.org/pub/linux/network/connman/sha256sums.asc
-sha256 9f62a7169b7491c670a1ff2e335b0d966308fb2f62e285c781105eb90f181af3 connman-1.39.tar.xz
+sha256 1a57ae7ce234aa3a1744aac3be5c2121d98dce999440ef8ab9cc4edfd5edcb12 connman-1.40.tar.xz
# Locally computed
sha256 b499eddebda05a8859e32b820a64577d91f1de2b52efa2a1575a2cb4000bc259 COPYING
#
################################################################################
-CONNMAN_VERSION = 1.39
+CONNMAN_VERSION = 1.40
CONNMAN_SOURCE = connman-$(CONNMAN_VERSION).tar.xz
CONNMAN_SITE = $(BR2_KERNEL_MIRROR)/linux/network/connman
CONNMAN_DEPENDENCIES = libglib2 dbus iptables