Debian Security Advisory
DSA-3682-1 c-ares -- security update
- Date Reported:
- 30 Sep 2016
- Affected Packages:
- c-ares
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 839151.
In Mitre's CVE dictionary: CVE-2016-5180. - More information:
-
Gzob Qq discovered that the query-building functions in c-ares, an asynchronous DNS request library would not correctly process crafted query names, resulting in a heap buffer overflow and potentially leading to arbitrary code execution.
For the stable distribution (jessie), this problem has been fixed in version 1.10.0-2+deb8u1.
For the unstable distribution (sid), this problem has been fixed in version 1.12.0-1.
We recommend that you upgrade your c-ares packages.