[RHSA-2023:3741] c-ares security update
Severity
Important
Affected Packages
14
CVEs
1
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
- c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2023:3741
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:3741
- Published
-
2023-06-21T00:00:00
(15 months ago) - Modified
-
2023-06-21T00:00:00
(15 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1770
- ALAS2-2023-2127
- ALSA-2023:3559
- ALSA-2023:3577
- ALSA-2023:3584
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- DSA-5419-1
- ELSA-2023-3559
- ELSA-2023-3577
- ELSA-2023-3584
- ELSA-2023-3586
- ELSA-2023-3741
- ELSA-2023-4034
- ELSA-2023-4035
- FEDORA-2023-520848815b
- FEDORA-2023-ae97529c00
- GLSA-202310-09
- RHSA-2023:3559
- RHSA-2023:3577
- RHSA-2023:3584
- RHSA-2023:3586
- RHSA-2023:4034
- RHSA-2023:4035
- RLSA-2023:3559
- RLSA-2023:3584
- SSA:2023-142-01
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
- USN-6164-1
- USN-6164-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2209502 | https://bugzilla.redhat.com/2209502 | |
RHSA | RHSA-2023:3741 | https://access.redhat.com/errata/RHSA-2023:3741 | |
CVE | CVE-2023-32067 | https://access.redhat.com/security/cve/CVE-2023-32067 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/c-ares?arch=s390&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | s390 | |
Affected | pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares?arch=ppc64&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/c-ares?arch=ppc&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc | |
Affected | pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-7.9 | redhat | c-ares | < 1.10.0-3.el7_9.1 | redhat-7.9 | i686 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=s390&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | s390 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=ppc64&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=ppc&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | ppc | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-7.9 | redhat | c-ares-devel | < 1.10.0-3.el7_9.1 | redhat-7.9 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |