[ALAS2-2024-2429] Amazon Linux 2 2017.12 - ALAS2-2024-2429: low priority package update for c-ares
Severity
Low
Affected Packages
9
CVEs
1
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2023-31124:
When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/c-ares?arch=x86_64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares?arch=i686&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares?arch=aarch64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-devel?arch=x86_64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-devel?arch=i686&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-devel?arch=aarch64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-debuginfo?arch=i686&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
pkg:rpm/amazonlinux/c-ares-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 1.10.0-3.amzn2.0.5 |
- ID
- ALAS2-2024-2429
- Severity
- low
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2429.html
- Published
-
2024-01-19T01:51:00
(8 months ago) - Modified
-
2024-01-19T01:51:00
(8 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALSA-2023:3577
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:6635
- ELSA-2023-3577
- ELSA-2023-3586
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-6635
- FEDORA-2023-520848815b
- FEDORA-2023-ae97529c00
- GLSA-202310-09
- MS:CVE-2023-31124
- RHSA-2023:3577
- RHSA-2023:3586
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:6635
- SSA:2023-142-01
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-31124 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/c-ares?arch=x86_64&distro=amazonlinux-2 | amazonlinux | c-ares | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/c-ares?arch=i686&distro=amazonlinux-2 | amazonlinux | c-ares | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/c-ares?arch=aarch64&distro=amazonlinux-2 | amazonlinux | c-ares | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/c-ares-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | c-ares-devel | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/c-ares-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | c-ares-devel | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/c-ares-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | c-ares-devel | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/c-ares-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | c-ares-debuginfo | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/c-ares-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | c-ares-debuginfo | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/c-ares-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | c-ares-debuginfo | < 1.10.0-3.amzn2.0.5 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |