Commit Graph

13 Commits

Author SHA1 Message Date
Fabrice Fontaine
4b2d3198c3 package/c-ares: bump to version 1.18.1
Drop patch (already in version) and so autoreconf

https://c-ares.org/changelog.html#1_18_1

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2021-11-05 17:09:06 +01:00
Fabrice Fontaine
6be5219c41 package/c-ares: security bump to version 1.17.2
- NodeJS passes NULL for addr and 0 for addrlen to
  ares_parse_ptr_reply() on systems where malloc(0) returns NULL. This
  would cause a crash.
- If ares_getaddrinfo() was terminated by an ares_destroy(), it would
  cause a crash
- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected
  DNS response
- Expand number of escaped characters in DNS replies as per RFC1035 5.1
  to prevent spoofing follow-up
- Perform validation on hostnames to prevent possible XSS due to
  applications not performing valiation themselves

https://c-ares.haxx.se/changelog.html#1_17_2

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2021-08-29 23:19:48 +02:00
Fabrice Fontaine
877eff50bc package/c-ares: bump to version 1.17.1
Drop patch (not needed since
b83731ddb6)
and so autoreconf

https://c-ares.haxx.se/changelog.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2021-01-02 23:54:06 +01:00
Fabrice Fontaine
c7a369a907 package/c-ares: security bump to version 1.17.0
- avoid read-heap-buffer-overflow in ares_parse_soa_reply found during
  fuzzing
- Avoid theoretical buffer overflow in RC4 loop comparison
- Empty hquery->name could lead to invalid memory access
- ares_parse_{a,aaaa}_reply() could return a larger *naddrttls than was
  passed in

https://c-ares.haxx.se/changelog.html#1_17_0

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2020-11-17 20:57:50 +01:00
Fabrice Fontaine
42a0b2d2d9 package/c-ares: security bump to version 1.16.1
Prevent possible use-after-free and double-free in ares_getaddrinfo() if
ares_destroy() is called prior to ares_getaddrinfo() completing.

https://c-ares.haxx.se/changelog.html#1_16_1

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2020-05-12 10:42:03 +02:00
Fabrice Fontaine
6620250fc5 package/c-ares: bump to version 1.16.0
- Remove patch (already in version)
- Update indentation of hash file (two spaces)

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2020-03-14 15:03:57 +01:00
Fabrice Fontaine
a6dc02327a package/c-ares: bump to version 1.15.0
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2018-12-01 22:20:30 +01:00
Fabrice Fontaine
736aabde4a package/c-ares: use LICENSE.md
c-ares has a LICENSE.md file since version 1.12 and
4e861351d9

So use it instead of one of the source file and add its hash

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2018-12-01 22:20:18 +01:00
Martin Bark
103855a2e0 package/c-ares: bump version to 1.14.0
Signed-off-by: Martin Bark <martin@barkynet.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2018-03-09 23:00:32 +01:00
Peter Korsgaard
d1481fe474 c-ares: security bump to version 1.13.0
Fixes the following security issues:

CVE-2017-1000381: The c-ares function `ares_parse_naptr_reply()`, which is
used for parsing NAPTR responses, could be triggered to read memory outside
of the given input buffer if the passed in DNS response packet was crafted
in a particular way.

https://c-ares.haxx.se/adv_20170620.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2017-06-21 07:43:35 +02:00
Gustavo Zacarias
2d199dcff0 c-ares: security bump to version 1.12.0
Fixes:
CVE-2016-5180 - ares_create_query single byte out of buffer write

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2016-10-13 07:39:46 +02:00
Gustavo Zacarias
985299b978 c-ares: bump to version 1.11.0
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2016-03-22 10:01:50 +01:00
Fabio Porcedda
b3b3df1f23 package/c-ares: add hash
[Peter: verify against pgp signature]
Signed-off-by: Fabio Porcedda <fabio.porcedda@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2015-04-21 09:03:54 +02:00