VYPR

apk package

chainguard/c-ares-dev

pkg:apk/chainguard/c-ares-dev

Vulnerabilities (5)

  • CVE-2024-25629Feb 23, 2024
    affected < 1.27.0-r0fixed 1.27.0-r0

    c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these conf

  • CVE-2023-32067May 25, 2023
    affected < 1.19.1-r0fixed 1.19.1-r0

    c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 lengt

  • CVE-2023-31147May 25, 2023
    affected < 1.19.1-r0fixed 1.19.1-r0

    c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the ra

  • CVE-2023-31130May 25, 2023
    affected < 1.19.1-r0fixed 1.19.1-r0

    c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an

  • CVE-2023-31124May 25, 2023
    affected < 1.19.1-r0fixed 1.19.1-r0

    c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take