musl: add upstream security fix for CVE-2017-15650
authorPeter Korsgaard <peter@korsgaard.com>
Sat, 21 Oct 2017 19:12:59 +0000 (21:12 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Sat, 21 Oct 2017 21:00:45 +0000 (23:00 +0200)
commit209f42fd3a5f4357e22fb72f1597a6868566aabd
treebd9ab553572edbbee9200719e0110e6b6caa17de
parent5f50fb8d1df51b622537da015f8c3b7b6dcbbc35
musl: add upstream security fix for CVE-2017-15650

>From the upstream announcement:
http://www.openwall.com/lists/oss-security/2017/10/19/5

Felix Wilhelm has discovered a flaw in the dns response parsing for
musl libc 1.1.16 that leads to overflow of a stack-based buffer.
Earlier versions are also affected.

When an application makes a request via getaddrinfo for both IPv4 and
IPv6 results (AF_UNSPEC), an attacker who controls or can spoof the
nameservers configured in resolv.conf can reply to both the A and AAAA
queries with A results. Since A records are smaller than AAAA records,
it's possible to fit more addresses than the precomputed bound, and a
buffer overflow occurs.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/musl/0003-in-dns-parsing-callback-enforce-MAXADDRS-to-preclude.patch [new file with mode: 0644]