DSA-2353-1 ldns -- buffer overflow

Related Vulnerabilities: CVE-2011-3581  

David Wheeler discovered a buffer overflow in ldns's code to parse RR records, which could lead to the execution of arbitrary code. For the oldstable distribution (lenny), this problem has been fixed in version 1.4.0-1+lenny2. For the stable distribution (squeeze), this problem has been fixed in version 1.6.6-2+squeeze1. For the unstable distribution (sid), this problem has been fixed in version 1.6.11-1. We recommend that you upgrade your ldns packages.

Debian Security Advisory

DSA-2353-1 ldns -- buffer overflow

Date Reported:
24 Nov 2011
Affected Packages:
ldns
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2011-3581.
More information:

David Wheeler discovered a buffer overflow in ldns's code to parse RR records, which could lead to the execution of arbitrary code.

For the oldstable distribution (lenny), this problem has been fixed in version 1.4.0-1+lenny2.

For the stable distribution (squeeze), this problem has been fixed in version 1.6.6-2+squeeze1.

For the unstable distribution (sid), this problem has been fixed in version 1.6.11-1.

We recommend that you upgrade your ldns packages.