Lucene search

K
almalinuxAlmaLinuxALSA-2023:6635
HistoryNov 07, 2023 - 12:00 a.m.

Moderate: c-ares security, bug fix, and enhancement update

2023-11-0700:00:00
errata.almalinux.org
5
c-ares library
upgrade
security fixes
enhancements
dns requests
buffer overflow
string length check
buffer underwrite
insufficient randomness
generation
cve page
almalinux release notes

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

42.1%

The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.

The following packages have been upgraded to a later upstream version: c-ares (1.19.1). (BZ#2210370)

Security Fix(es):

  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
  • c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
  • c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
  • c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

42.1%