ldns: Arbitrary code execution A heap-based buffer overflow in ldns might allow remote attackers to execute arbitrary code or cause a Denial of Service condition. ldns 2014-01-21 2014-01-21: 1 384249 remote 1.6.11 1.6.11

ldns is a fast DNS library with the goal to simplify DNS programming and to allow developers to easily create software conforming to current RFCs and Internet drafts.

ldns contains a heap-based buffer overflow in the ldns_rr_new_frm_str_internal function.

A remote attacker could execute arbitrary code or cause a Denial of Service condition with a crafted Resource Record.

There is no known workaround at this time.

All ldns users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/ldns-1.6.11"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since October 11, 2011. It is likely that your system is already no longer affected by this issue.

CVE-2011-3581 underling craig