c-ares: security bump to version 1.13.0
authorPeter Korsgaard <peter@korsgaard.com>
Tue, 20 Jun 2017 21:24:21 +0000 (23:24 +0200)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Wed, 21 Jun 2017 05:43:35 +0000 (07:43 +0200)
commitd1481fe47493546171ff8f9949e95299c5359d8e
tree30a4ed1901fe8bf2e456a1a768b65947bb4a4526
parent438b2d1369738416b2dc9e23880753b0120ac6a6
c-ares: security bump to version 1.13.0

Fixes the following security issues:

CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
used for parsing NAPTR responses, could be triggered to read memory outside
of the given input buffer if the passed in DNS response packet was crafted
in a particular way.

https://c-ares.haxx.se/adv_20170620.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/c-ares/c-ares.hash
package/c-ares/c-ares.mk