Lucene search

K
debianDebianDEBIAN:DLA-3323-1:4674B
HistoryFeb 18, 2023 - 10:55 p.m.

[SECURITY] [DLA 3323-1] c-ares security update

2023-02-1822:55:21
lists.debian.org
1
c-ares
stack overflow
denial of service
debian 10

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.2%


Debian LTS Advisory DLA-3323-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
February 18, 2023 https://wiki.debian.org/LTS

Package : c-ares
Version : 1.14.0-1+deb10u2
CVE ID : CVE-2022-4904
Debian Bug : 1031525

It was discovered that in c-ares, an asynchronous name resolver library,
the config_sortlist function is missing checks about the validity of the
input string, which allows a possible arbitrary length stack overflow and
thus may cause a denial of service.

For Debian 10 buster, this problem has been fixed in version
1.14.0-1+deb10u2.

We recommend that you upgrade your c-ares packages.

For the detailed security status of c-ares please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/c-ares

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.2%