Message ID | 20170620212421.17455-1-peter@korsgaard.com |
---|---|
State | Accepted |
Headers | show |
Hello, On Tue, 20 Jun 2017 23:24:21 +0200, Peter Korsgaard wrote: > Fixes the following security issues: > > CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is > used for parsing NAPTR responses, could be triggered to read memory outside > of the given input buffer if the passed in DNS response packet was crafted > in a particular way. > > https://c-ares.haxx.se/adv_20170620.html > > Signed-off-by: Peter Korsgaard <peter@korsgaard.com> > --- > package/c-ares/c-ares.hash | 2 +- > package/c-ares/c-ares.mk | 2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) Applied to master, thanks. Thomas
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes: > Fixes the following security issues: > CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is > used for parsing NAPTR responses, could be triggered to read memory outside > of the given input buffer if the passed in DNS response packet was crafted > in a particular way. > https://c-ares.haxx.se/adv_20170620.html > Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Committed to 2017.02.x and 2017.05.x, thanks.
diff --git a/package/c-ares/c-ares.hash b/package/c-ares/c-ares.hash index f46ef02aba..79928ae843 100644 --- a/package/c-ares/c-ares.hash +++ b/package/c-ares/c-ares.hash @@ -1,2 +1,2 @@ # Locally calculated after checking pgp signature -sha256 8692f9403cdcdf936130e045c84021665118ee9bfea905d1a76f04d4e6f365fb c-ares-1.12.0.tar.gz +sha256 03f708f1b14a26ab26c38abd51137640cb444d3ec72380b21b20f1a8d2861da7 c-ares-1.13.0.tar.gz diff --git a/package/c-ares/c-ares.mk b/package/c-ares/c-ares.mk index e817d4add5..72019a0425 100644 --- a/package/c-ares/c-ares.mk +++ b/package/c-ares/c-ares.mk @@ -4,7 +4,7 @@ # ################################################################################ -C_ARES_VERSION = 1.12.0 +C_ARES_VERSION = 1.13.0 C_ARES_SITE = http://c-ares.haxx.se/download C_ARES_INSTALL_STAGING = YES C_ARES_CONF_OPTS = --with-random=/dev/urandom
Fixes the following security issues: CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way. https://c-ares.haxx.se/adv_20170620.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com> --- package/c-ares/c-ares.hash | 2 +- package/c-ares/c-ares.mk | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)