Multiple vulnerabilities have been found in mDNSResponder, which could lead to execution of arbitrary code with root privileges.
|Package||net-misc/mDNSResponder on all architectures|
|Affected versions||< 212.1|
|Unaffected versions||>= 212.1|
mDNSResponder is a component of Apple's Bonjour, an initiative for zero-configuration networking.
Multiple vulnerabilities have been discovered in mDNSResponder. Please review the CVE identifiers referenced below for details.
A local or remote attacker may be able to execute arbitrary code with root privileges or cause a Denial of Service.
There is no known workaround at this time.
All mDNSResponder users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mDNSResponder-212.1"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is already no longer affected by this issue.
January 22, 2012
January 22, 2012: 1