kumquat-buildroot/package/musl
Peter Korsgaard 209f42fd3a musl: add upstream security fix for CVE-2017-15650
>From the upstream announcement:
http://www.openwall.com/lists/oss-security/2017/10/19/5

Felix Wilhelm has discovered a flaw in the dns response parsing for
musl libc 1.1.16 that leads to overflow of a stack-based buffer.
Earlier versions are also affected.

When an application makes a request via getaddrinfo for both IPv4 and
IPv6 results (AF_UNSPEC), an attacker who controls or can spoof the
nameservers configured in resolv.conf can reply to both the A and AAAA
queries with A results. Since A records are smaller than AAAA records,
it's possible to fit more addresses than the precomputed bound, and a
buffer overflow occurs.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2017-10-21 23:00:45 +02:00
..
0001-avoid-kernel-if_ether.h.patch
0002-arm-atomics-asm-with-new-binutils.patch
0003-in-dns-parsing-callback-enforce-MAXADDRS-to-preclude.patch
Config.in
musl.hash
musl.mk