* [Buildroot] [PATCH] c-ares: security bump to version 1.13.0
@ 2017-06-20 21:24 Peter Korsgaard
2017-06-21 5:44 ` Thomas Petazzoni
2017-06-26 8:00 ` Peter Korsgaard
0 siblings, 2 replies; 3+ messages in thread
From: Peter Korsgaard @ 2017-06-20 21:24 UTC (permalink / raw)
To: buildroot
Fixes the following security issues:
CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
used for parsing NAPTR responses, could be triggered to read memory outside
of the given input buffer if the passed in DNS response packet was crafted
in a particular way.
https://c-ares.haxx.se/adv_20170620.html
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
package/c-ares/c-ares.hash | 2 +-
package/c-ares/c-ares.mk | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/c-ares/c-ares.hash b/package/c-ares/c-ares.hash
index f46ef02aba..79928ae843 100644
--- a/package/c-ares/c-ares.hash
+++ b/package/c-ares/c-ares.hash
@@ -1,2 +1,2 @@
# Locally calculated after checking pgp signature
-sha256 8692f9403cdcdf936130e045c84021665118ee9bfea905d1a76f04d4e6f365fb c-ares-1.12.0.tar.gz
+sha256 03f708f1b14a26ab26c38abd51137640cb444d3ec72380b21b20f1a8d2861da7 c-ares-1.13.0.tar.gz
diff --git a/package/c-ares/c-ares.mk b/package/c-ares/c-ares.mk
index e817d4add5..72019a0425 100644
--- a/package/c-ares/c-ares.mk
+++ b/package/c-ares/c-ares.mk
@@ -4,7 +4,7 @@
#
################################################################################
-C_ARES_VERSION = 1.12.0
+C_ARES_VERSION = 1.13.0
C_ARES_SITE = http://c-ares.haxx.se/download
C_ARES_INSTALL_STAGING = YES
C_ARES_CONF_OPTS = --with-random=/dev/urandom
--
2.11.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] c-ares: security bump to version 1.13.0
2017-06-20 21:24 [Buildroot] [PATCH] c-ares: security bump to version 1.13.0 Peter Korsgaard
@ 2017-06-21 5:44 ` Thomas Petazzoni
2017-06-26 8:00 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Thomas Petazzoni @ 2017-06-21 5:44 UTC (permalink / raw)
To: buildroot
Hello,
On Tue, 20 Jun 2017 23:24:21 +0200, Peter Korsgaard wrote:
> Fixes the following security issues:
>
> CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
> used for parsing NAPTR responses, could be triggered to read memory outside
> of the given input buffer if the passed in DNS response packet was crafted
> in a particular way.
>
> https://c-ares.haxx.se/adv_20170620.html
>
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
> ---
> package/c-ares/c-ares.hash | 2 +-
> package/c-ares/c-ares.mk | 2 +-
> 2 files changed, 2 insertions(+), 2 deletions(-)
Applied to master, thanks.
Thomas
--
Thomas Petazzoni, CTO, Free Electrons
Embedded Linux, Kernel and Android engineering
http://free-electrons.com
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] c-ares: security bump to version 1.13.0
2017-06-20 21:24 [Buildroot] [PATCH] c-ares: security bump to version 1.13.0 Peter Korsgaard
2017-06-21 5:44 ` Thomas Petazzoni
@ 2017-06-26 8:00 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2017-06-26 8:00 UTC (permalink / raw)
To: buildroot
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:
> Fixes the following security issues:
> CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
> used for parsing NAPTR responses, could be triggered to read memory outside
> of the given input buffer if the passed in DNS response packet was crafted
> in a particular way.
> https://c-ares.haxx.se/adv_20170620.html
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Committed to 2017.02.x and 2017.05.x, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2017-06-26 8:00 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-06-20 21:24 [Buildroot] [PATCH] c-ares: security bump to version 1.13.0 Peter Korsgaard
2017-06-21 5:44 ` Thomas Petazzoni
2017-06-26 8:00 ` Peter Korsgaard
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.