[GLSA-202401-02] c-ares: Multiple Vulnerabilities
Severity
Normal
Affected Packages
1
Unaffected Packages
1
CVEs
6
Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.
Background
c-ares is a C library for asynchronous DNS requests (including name resolves).
Description
Multiple vulnerabilities have been discovered in c-ares. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All c-ares users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/c-ares-1.19.0"
Package | Affected Version |
---|---|
pkg:ebuild/net-dns/c-ares?distro=gentoo | < 1.19.0 |
Package | Unaffected Version |
---|---|
pkg:ebuild/net-dns/c-ares?distro=gentoo | >= 1.19.0 |
- ID
- GLSA-202401-02
- Severity
- normal
- URL
- https://security.gentoo.org/glsa/202401-02
- Published
-
2024-01-05T00:00:00
(8 months ago) - Modified
-
2024-01-05T00:00:00
(8 months ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2021-1545
- ALAS-2023-1780
- ALAS2-2024-2399
- ALPINE:CVE-2021-22930
- ALPINE:CVE-2021-22931
- ALPINE:CVE-2021-22939
- ALPINE:CVE-2021-3672
- ALSA-2021:3623
- ALSA-2021:3666
- ALSA-2022:2043
- ALSA-2023:1582
- ALSA-2023:1743
- ALSA-2023:2654
- ALSA-2023:2655
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7116
- ASA-202108-1
- ASA-202108-13
- DSA-4954-1
- ELSA-2021-3623
- ELSA-2021-3666
- ELSA-2022-2043
- ELSA-2023-1582
- ELSA-2023-1743
- ELSA-2023-2654
- ELSA-2023-2655
- ELSA-2023-4035
- ELSA-2023-6635
- ELSA-2023-7116
- FEDORA-2021-001ec24fc5
- FEDORA-2021-0a60cbb948
- FEDORA-2021-52c89b44a9
- FEDORA-2021-a48cf28c13
- FEDORA-2021-c83b66abdb
- FEDORA-2023-30e81e5293
- FEDORA-2023-b121bd62a9
- FREEBSD:43E9FFD4-D6E0-11ED-956F-7054D21A9E2A
- FREEBSD:B092BD4F-1B16-11EC-9D9D-0022489AD614
- FREEBSD:C9387E4D-2F5F-11EC-8BE6-D4C9EF517024
- FREEBSD:F53DAB71-1B15-11EC-9D9D-0022489AD614
- GLSA-202405-29
- MS:CVE-2021-22930
- MS:CVE-2021-3672
- openSUSE-SU-2021:1168-1
- openSUSE-SU-2021:1214-1
- openSUSE-SU-2021:1239-1
- openSUSE-SU-2021:1313-1
- openSUSE-SU-2021:1343-1
- openSUSE-SU-2021:2760-1
- openSUSE-SU-2021:2875-1
- openSUSE-SU-2021:2953-1
- openSUSE-SU-2021:3211-1
- openSUSE-SU-2021:3294-1
- RHSA-2021:3623
- RHSA-2021:3666
- RHSA-2022:2043
- RHSA-2023:1582
- RHSA-2023:1743
- RHSA-2023:2654
- RHSA-2023:2655
- RHSA-2023:4035
- RHSA-2023:6635
- RHSA-2023:7116
- RLSA-2021:3623
- RLSA-2021:3666
- RLSA-2022:2043
- RLSA-2023:2655
- SUSE-SU-2021:2690-1
- SUSE-SU-2021:2760-1
- SUSE-SU-2021:2790-1
- SUSE-SU-2021:2823-1
- SUSE-SU-2021:2824-1
- SUSE-SU-2021:2875-1
- SUSE-SU-2021:2953-1
- SUSE-SU-2021:3184-1
- SUSE-SU-2021:3211-1
- SUSE-SU-2021:3294-1
- SUSE-SU-2022:2855-1
- SUSE-SU-2023:0486-1
- SUSE-SU-2023:3420-1
- USN-5034-1
- USN-5034-2
- USN-5907-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-3672 | CVE-2021-3672 | https://nvd.nist.gov/vuln/detail/CVE-2021-3672 |
CVE | CVE-2021-22930 | CVE-2021-22930 | https://nvd.nist.gov/vuln/detail/CVE-2021-22930 |
CVE | CVE-2021-22931 | CVE-2021-22931 | https://nvd.nist.gov/vuln/detail/CVE-2021-22931 |
CVE | CVE-2021-22939 | CVE-2021-22939 | https://nvd.nist.gov/vuln/detail/CVE-2021-22939 |
CVE | CVE-2021-22940 | CVE-2021-22940 | https://nvd.nist.gov/vuln/detail/CVE-2021-22940 |
CVE | CVE-2022-4904 | CVE-2022-4904 | https://nvd.nist.gov/vuln/detail/CVE-2022-4904 |
Bugzilla | 807604 | Bugzilla #807604 | https://bugs.gentoo.org/show_bug.cgi?id=807604 |
Bugzilla | 807775 | Bugzilla #807775 | https://bugs.gentoo.org/show_bug.cgi?id=807775 |
Bugzilla | 892489 | Bugzilla #892489 | https://bugs.gentoo.org/show_bug.cgi?id=892489 |
Bugzilla | 905341 | Bugzilla #905341 | https://bugs.gentoo.org/show_bug.cgi?id=905341 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |