ALT-BU-2023-5207-2
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2018-00106
Уязвимость функции ares_parse_naptr_reply библиотеки асинхронных DNS-запросов c-ares, позволяющая нарушителю выполнить чтение за границами буфера в памяти
BDU:2021-04594
Уязвимость функций ares_destroy() и ares_getaddrinfo() библиотеки асинхронных DNS-запросов C-ares, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01258
Уязвимость функции ares_set_sortlist библиотеки асинхронных DNS-запросов c-ares, позволяющая нарушителю вызвать отказ в обслуживании или оказать ограниченное влияния на конфиденциальность и целостность
BDU:2023-05898
Уязвимость функции ares_parse_soa_reply() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2016-5180
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
- RHSA-2017:0002
- RHSA-2017:0002
- DSA-3682
- DSA-3682
- 93243
- 93243
- USN-3143-1
- USN-3143-1
- https://c-ares.haxx.se/adv_20160929.html
- https://c-ares.haxx.se/adv_20160929.html
- https://c-ares.haxx.se/CVE-2016-5180.patch
- https://c-ares.haxx.se/CVE-2016-5180.patch
- https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
- https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
- GLSA-201701-28
- GLSA-201701-28
- https://source.android.com/security/bulletin/2017-01-01.html
- https://source.android.com/security/bulletin/2017-01-01.html
Modified: 2024-11-21
CVE-2017-1000381
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Modified: 2024-11-21
CVE-2020-14354
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://c-ares.haxx.se/changelog.html
- https://c-ares.haxx.se/changelog.html
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
Modified: 2024-11-21
CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
Modified: 2024-11-21
CVE-2022-4904
A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
Modified: 2025-02-13
CVE-2023-31124
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
- https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.gentoo.org/glsa/202310-09
Modified: 2025-02-13
CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
- https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.gentoo.org/glsa/202310-09
- https://security.netapp.com/advisory/ntap-20240605-0005/
- https://security.netapp.com/advisory/ntap-20240605-0005/
- https://www.debian.org/security/2023/dsa-5419
- https://www.debian.org/security/2023/dsa-5419
Modified: 2024-11-21
CVE-2023-31147
c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://security.gentoo.org/glsa/202310-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2
Modified: 2024-11-21
CVE-2023-32067
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.netapp.com/advisory/ntap-20240605-0004/
- https://www.debian.org/security/2023/dsa-5419
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://www.debian.org/security/2023/dsa-5419
- https://security.netapp.com/advisory/ntap-20240605-0004/
- https://security.gentoo.org/glsa/202310-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-42778
A heap double free issue was found in Opensc before version 0.22.0 in sc_pkcs15_free_tokeninfo.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
- https://bugzilla.redhat.com/show_bug.cgi?id=2016083
- https://bugzilla.redhat.com/show_bug.cgi?id=2016083
- https://github.com/OpenSC/OpenSC/commit/f015746d
- https://github.com/OpenSC/OpenSC/commit/f015746d
- GLSA-202209-03
- GLSA-202209-03
Modified: 2024-11-21
CVE-2021-42779
A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
- https://bugzilla.redhat.com/show_bug.cgi?id=2016086
- https://bugzilla.redhat.com/show_bug.cgi?id=2016086
- https://github.com/OpenSC/OpenSC/commit/1db88374
- https://github.com/OpenSC/OpenSC/commit/1db88374
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- GLSA-202209-03
- GLSA-202209-03
Modified: 2024-11-21
CVE-2021-42780
A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
- https://bugzilla.redhat.com/show_bug.cgi?id=2016139
- https://bugzilla.redhat.com/show_bug.cgi?id=2016139
- https://github.com/OpenSC/OpenSC/commit/5df913b7
- https://github.com/OpenSC/OpenSC/commit/5df913b7
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- GLSA-202209-03
- GLSA-202209-03
Modified: 2024-11-21
CVE-2021-42781
Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library.
- https://bugzilla.redhat.com/show_bug.cgi?id=2016439
- https://bugzilla.redhat.com/show_bug.cgi?id=2016439
- https://github.com/OpenSC/OpenSC/commit/05648b06
- https://github.com/OpenSC/OpenSC/commit/05648b06
- https://github.com/OpenSC/OpenSC/commit/17d8980c
- https://github.com/OpenSC/OpenSC/commit/17d8980c
- https://github.com/OpenSC/OpenSC/commit/40c50a3a
- https://github.com/OpenSC/OpenSC/commit/40c50a3a
- https://github.com/OpenSC/OpenSC/commit/5d4daf6c
- https://github.com/OpenSC/OpenSC/commit/5d4daf6c
- https://github.com/OpenSC/OpenSC/commit/cae5c71f
- https://github.com/OpenSC/OpenSC/commit/cae5c71f
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- GLSA-202209-03
- GLSA-202209-03
Modified: 2024-11-21
CVE-2021-42782
Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library.
- https://bugzilla.redhat.com/show_bug.cgi?id=2016448
- https://bugzilla.redhat.com/show_bug.cgi?id=2016448
- https://github.com/OpenSC/OpenSC/commit/1252aca9
- https://github.com/OpenSC/OpenSC/commit/1252aca9
- https://github.com/OpenSC/OpenSC/commit/456ac566
- https://github.com/OpenSC/OpenSC/commit/456ac566
- https://github.com/OpenSC/OpenSC/commit/7114fb71
- https://github.com/OpenSC/OpenSC/commit/7114fb71
- https://github.com/OpenSC/OpenSC/commit/78cdab94
- https://github.com/OpenSC/OpenSC/commit/78cdab94
- https://github.com/OpenSC/OpenSC/commit/ae1cf0be
- https://github.com/OpenSC/OpenSC/commit/ae1cf0be
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- GLSA-202209-03
- GLSA-202209-03