Lucene search

K
redhatRedHatRHSA-2023:6635
HistoryNov 07, 2023 - 6:10 a.m.

(RHSA-2023:6635) Moderate: c-ares security, bug fix, and enhancement update

2023-11-0706:10:43
access.redhat.com
10
c-ares
upgrade
security fixes
dns requests
cve-2022-4904
cve-2023-31130
cve-2023-31147
cve-2023-31124
red hat enterprise linux 9.3 release notes

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

40.0%

The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.

The following packages have been upgraded to a later upstream version: c-ares (1.19.1). (BZ#2210370)

Security Fix(es):

  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)

  • c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)

  • c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)

  • c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.