[RHSA-2023:7116] c-ares security update
Severity
Moderate
Affected Packages
10
CVEs
1
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
- c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares?arch=aarch64&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-8 | < 1.13.0-8.el8 |
pkg:rpm/redhat/c-ares-devel?arch=aarch64&distro=redhat-8 | < 1.13.0-8.el8 |
- ID
- RHSA-2023:7116
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:7116
- Published
-
2023-11-14T00:00:00
(10 months ago) - Modified
-
2023-11-14T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1780
- ALAS2-2024-2399
- ALSA-2023:1582
- ALSA-2023:1743
- ALSA-2023:2654
- ALSA-2023:2655
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7116
- ELSA-2023-1582
- ELSA-2023-1743
- ELSA-2023-2654
- ELSA-2023-2655
- ELSA-2023-4035
- ELSA-2023-6635
- ELSA-2023-7116
- FEDORA-2023-30e81e5293
- FEDORA-2023-b121bd62a9
- GLSA-202401-02
- RHSA-2023:1582
- RHSA-2023:1743
- RHSA-2023:2654
- RHSA-2023:2655
- RHSA-2023:4035
- RHSA-2023:6635
- RLSA-2023:2655
- SUSE-SU-2023:0486-1
- SUSE-SU-2023:3420-1
- USN-5907-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2168631 | https://bugzilla.redhat.com/2168631 | |
RHSA | RHSA-2023:7116 | https://access.redhat.com/errata/RHSA-2023:7116 | |
CVE | CVE-2022-4904 | https://access.redhat.com/security/cve/CVE-2022-4904 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/c-ares?arch=x86_64&distro=redhat-8 | redhat | c-ares | < 1.13.0-8.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares?arch=s390x&distro=redhat-8 | redhat | c-ares | < 1.13.0-8.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/c-ares?arch=ppc64le&distro=redhat-8 | redhat | c-ares | < 1.13.0-8.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares?arch=i686&distro=redhat-8 | redhat | c-ares | < 1.13.0-8.el8 | redhat-8 | i686 | |
Affected | pkg:rpm/redhat/c-ares?arch=aarch64&distro=redhat-8 | redhat | c-ares | < 1.13.0-8.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=x86_64&distro=redhat-8 | redhat | c-ares-devel | < 1.13.0-8.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=s390x&distro=redhat-8 | redhat | c-ares-devel | < 1.13.0-8.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=ppc64le&distro=redhat-8 | redhat | c-ares-devel | < 1.13.0-8.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=i686&distro=redhat-8 | redhat | c-ares-devel | < 1.13.0-8.el8 | redhat-8 | i686 | |
Affected | pkg:rpm/redhat/c-ares-devel?arch=aarch64&distro=redhat-8 | redhat | c-ares-devel | < 1.13.0-8.el8 | redhat-8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |