c-ares: security bump to version 1.13.0
authorPeter Korsgaard <peter@korsgaard.com>
Tue, 20 Jun 2017 21:24:21 +0000 (23:24 +0200)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Wed, 21 Jun 2017 05:43:35 +0000 (07:43 +0200)
Fixes the following security issues:

CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
used for parsing NAPTR responses, could be triggered to read memory outside
of the given input buffer if the passed in DNS response packet was crafted
in a particular way.

https://c-ares.haxx.se/adv_20170620.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/c-ares/c-ares.hash
package/c-ares/c-ares.mk

index f46ef02aba360f6c882c431f51ef0174fb1fdfb8..79928ae84363570d58a589b1fe9527e8c3695c52 100644 (file)
@@ -1,2 +1,2 @@
 # Locally calculated after checking pgp signature
-sha256 8692f9403cdcdf936130e045c84021665118ee9bfea905d1a76f04d4e6f365fb c-ares-1.12.0.tar.gz
+sha256 03f708f1b14a26ab26c38abd51137640cb444d3ec72380b21b20f1a8d2861da7 c-ares-1.13.0.tar.gz
index e817d4add54e22ec0879457ef2b0f085af0bfe74..72019a0425e929c5a8f081a85086e63d5ae8c862 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-C_ARES_VERSION = 1.12.0
+C_ARES_VERSION = 1.13.0
 C_ARES_SITE = http://c-ares.haxx.se/download
 C_ARES_INSTALL_STAGING = YES
 C_ARES_CONF_OPTS = --with-random=/dev/urandom