4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%
Issue Overview:
c-ares is a C library for asynchronous DNS requests. ares__read_line()
is used to parse local configuration files such as /etc/resolv.conf
, /etc/nsswitch.conf
, the HOSTALIASES
file, and if using a c-ares version prior to 1.27.0, the /etc/hosts
file. If any of these configuration files has an embedded NULL
character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist. (CVE-2024-25629)
Affected Packages:
c-ares
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update c-ares to update your system.
New Packages:
aarch64:
c-ares-1.10.0-3.amzn2.0.6.aarch64
c-ares-devel-1.10.0-3.amzn2.0.6.aarch64
c-ares-debuginfo-1.10.0-3.amzn2.0.6.aarch64
i686:
c-ares-1.10.0-3.amzn2.0.6.i686
c-ares-devel-1.10.0-3.amzn2.0.6.i686
c-ares-debuginfo-1.10.0-3.amzn2.0.6.i686
src:
c-ares-1.10.0-3.amzn2.0.6.src
x86_64:
c-ares-1.10.0-3.amzn2.0.6.x86_64
c-ares-devel-1.10.0-3.amzn2.0.6.x86_64
c-ares-debuginfo-1.10.0-3.amzn2.0.6.x86_64
Red Hat: CVE-2024-25629
Mitre: CVE-2024-25629
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | c-ares | < 1.10.0-3.amzn2.0.6 | c-ares-1.10.0-3.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | aarch64 | c-ares-devel | < 1.10.0-3.amzn2.0.6 | c-ares-devel-1.10.0-3.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | aarch64 | c-ares-debuginfo | < 1.10.0-3.amzn2.0.6 | c-ares-debuginfo-1.10.0-3.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | i686 | c-ares | < 1.10.0-3.amzn2.0.6 | c-ares-1.10.0-3.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | i686 | c-ares-devel | < 1.10.0-3.amzn2.0.6 | c-ares-devel-1.10.0-3.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | i686 | c-ares-debuginfo | < 1.10.0-3.amzn2.0.6 | c-ares-debuginfo-1.10.0-3.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | x86_64 | c-ares | < 1.10.0-3.amzn2.0.6 | c-ares-1.10.0-3.amzn2.0.6.x86_64.rpm |
Amazon Linux | 2 | x86_64 | c-ares-devel | < 1.10.0-3.amzn2.0.6 | c-ares-devel-1.10.0-3.amzn2.0.6.x86_64.rpm |
Amazon Linux | 2 | x86_64 | c-ares-debuginfo | < 1.10.0-3.amzn2.0.6 | c-ares-debuginfo-1.10.0-3.amzn2.0.6.x86_64.rpm |
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%