rpm package
opensuse/c-ares&distro=openSUSE Leap 15.4
pkg:rpm/opensuse/c-ares&distro=openSUSE%20Leap%2015.4
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-32067 | — | < 1.19.1-150000.3.23.1 | 1.19.1-150000.3.23.1 | May 25, 2023 | c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 lengt | ||
| CVE-2023-31147 | — | < 1.19.1-150000.3.23.1 | 1.19.1-150000.3.23.1 | May 25, 2023 | c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the ra | ||
| CVE-2023-31130 | — | < 1.19.1-150000.3.23.1 | 1.19.1-150000.3.23.1 | May 25, 2023 | c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an | ||
| CVE-2023-31124 | — | < 1.19.1-150000.3.23.1 | 1.19.1-150000.3.23.1 | May 25, 2023 | c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take | ||
| CVE-2022-4904 | — | < 1.19.0-150000.3.20.1 | 1.19.0-150000.3.20.1 | Mar 6, 2023 | A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. |
- CVE-2023-32067May 25, 2023affected < 1.19.1-150000.3.23.1fixed 1.19.1-150000.3.23.1
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 lengt
- CVE-2023-31147May 25, 2023affected < 1.19.1-150000.3.23.1fixed 1.19.1-150000.3.23.1
c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the ra
- CVE-2023-31130May 25, 2023affected < 1.19.1-150000.3.23.1fixed 1.19.1-150000.3.23.1
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an
- CVE-2023-31124May 25, 2023affected < 1.19.1-150000.3.23.1fixed 1.19.1-150000.3.23.1
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take
- CVE-2022-4904Mar 6, 2023affected < 1.19.0-150000.3.20.1fixed 1.19.0-150000.3.20.1
A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.