[RHSA-2023:6635] c-ares security, bug fix, and enhancement update
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
The following packages have been upgraded to a later upstream version: c-ares (1.19.1). (BZ#2210370)
Security Fix(es):
c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares?arch=aarch64&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-9 | < 1.19.1-1.el9 |
pkg:rpm/redhat/c-ares-devel?arch=aarch64&distro=redhat-9 | < 1.19.1-1.el9 |
- ID
- RHSA-2023:6635
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:6635
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-07T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1780
- ALAS2-2024-2399
- ALAS2-2024-2429
- ALSA-2023:1582
- ALSA-2023:1743
- ALSA-2023:2654
- ALSA-2023:2655
- ALSA-2023:3577
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7116
- ALSA-2023:7207
- DSA-5419-1
- ELSA-2023-1582
- ELSA-2023-1743
- ELSA-2023-2654
- ELSA-2023-2655
- ELSA-2023-3577
- ELSA-2023-3586
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-6635
- ELSA-2023-7116
- ELSA-2023-7207
- FEDORA-2023-30e81e5293
- FEDORA-2023-520848815b
- FEDORA-2023-ae97529c00
- FEDORA-2023-b121bd62a9
- GLSA-202310-09
- GLSA-202401-02
- MS:CVE-2023-31124
- RHSA-2023:1582
- RHSA-2023:1743
- RHSA-2023:2654
- RHSA-2023:2655
- RHSA-2023:3577
- RHSA-2023:3586
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:7116
- RHSA-2023:7207
- RLSA-2023:2655
- RLSA-2023:7207
- SSA:2023-142-01
- SUSE-SU-2023:0486-1
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
- SUSE-SU-2023:3420-1
- USN-5907-1
- USN-6164-1
- USN-6164-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2168631 | https://bugzilla.redhat.com/2168631 | |
Bugzilla | 2209494 | https://bugzilla.redhat.com/2209494 | |
Bugzilla | 2209497 | https://bugzilla.redhat.com/2209497 | |
Bugzilla | 2209501 | https://bugzilla.redhat.com/2209501 | |
RHSA | RHSA-2023:6635 | https://access.redhat.com/errata/RHSA-2023:6635 | |
CVE | CVE-2022-4904 | https://access.redhat.com/security/cve/CVE-2022-4904 | |
CVE | CVE-2023-31124 | https://access.redhat.com/security/cve/CVE-2023-31124 | |
CVE | CVE-2023-31130 | https://access.redhat.com/security/cve/CVE-2023-31130 | |
CVE | CVE-2023-31147 | https://access.redhat.com/security/cve/CVE-2023-31147 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-9 | redhat | c-ares | < 1.19.1-1.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-9 | redhat | c-ares | < 1.19.1-1.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-9 | redhat | c-ares | < 1.19.1-1.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-9 | redhat | c-ares | < 1.19.1-1.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/c-ares?arch=aarch64&distro=redhat-9 | redhat | c-ares | < 1.19.1-1.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-9 | redhat | c-ares-devel | < 1.19.1-1.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-9 | redhat | c-ares-devel | < 1.19.1-1.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-9 | redhat | c-ares-devel | < 1.19.1-1.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-9 | redhat | c-ares-devel | < 1.19.1-1.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=aarch64&distro=redhat-9 | redhat | c-ares-devel | < 1.19.1-1.el9 | redhat-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |