[SSA:2023-142-01] c-ares
New c-ares packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/c-ares-1.19.1-i586-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues:
0-byte UDP payload causes Denial of Service.
Insufficient randomness in generation of DNS query IDs.
Buffer Underwrite in ares_inet_net_pton().
AutoTools does not set CARES_RANDOM_FILE during cross compilation.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-32067
https://www.cve.org/CVERecord?id=CVE-2023-31147
https://www.cve.org/CVERecord?id=CVE-2023-31130
https://www.cve.org/CVERecord?id=CVE-2023-31124
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/c-ares-1.19.1-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/c-ares-1.19.1-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/c-ares-1.19.1-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/c-ares-1.19.1-x86_64-1.txz
MD5 signatures
Slackware 15.0 package:
7e5363abc94f1d4a507055b3dd51e76b c-ares-1.19.1-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
010557e82678ad022f7f6e7147856c19 c-ares-1.19.1-x86_64-1_slack15.0.txz
Slackware -current package:
618f32c0a74a4336f4427bdcb02521a3 n/c-ares-1.19.1-i586-1.txz
Slackware x86_64 -current package:
c3b2b4a3400f24104ca99a7258a594d4 n/c-ares-1.19.1-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg c-ares-1.19.1-i586-1_slack15.0.txz
- ID
- SSA:2023-142-01
- Severity
- high
- Severity from
- CVE-2023-32067
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.363713
- Published
-
2023-05-22T19:09:04
(16 months ago) - Modified
-
2023-05-22T19:09:04
(16 months ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2023-1770
- ALAS2-2023-2127
- ALAS2-2024-2399
- ALAS2-2024-2429
- ALSA-2023:3559
- ALSA-2023:3577
- ALSA-2023:3584
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7207
- DSA-5419-1
- ELSA-2023-3559
- ELSA-2023-3577
- ELSA-2023-3584
- ELSA-2023-3586
- ELSA-2023-3741
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-6635
- ELSA-2023-7207
- FEDORA-2023-520848815b
- FEDORA-2023-ae97529c00
- GLSA-202310-09
- MS:CVE-2023-31124
- RHSA-2023:3559
- RHSA-2023:3577
- RHSA-2023:3584
- RHSA-2023:3586
- RHSA-2023:3741
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:6635
- RHSA-2023:7207
- RLSA-2023:3559
- RLSA-2023:3584
- RLSA-2023:7207
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
- USN-6164-1
- USN-6164-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/c-ares?arch=x86_64&distro=slackware64-current | slackware | c-ares | < 1.19.1 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/c-ares?arch=x86_64&distro=slackware64-15.0 | slackware | c-ares | < 1.19.1 | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/c-ares?arch=i586&distro=slackware-current | slackware | c-ares | < 1.19.1 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/c-ares?arch=i586&distro=slackware-15.0 | slackware | c-ares | < 1.19.1 | slackware-15.0 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |