DSA-5419-1 c-ares -- c-aresID: oval:org.secpod.oval:def:93354 | Date: (C)2023-09-27 (M)2024-06-13 |
Class: PATCH | Family: unix |
Two vunerabilities were discovered in c-ares, an asynchronous name resolver library: CVE-2023-31130 ares_inet_net_pton is found to be vulnerable to a buffer underflow for certain ipv6 addresses, in particular '0::00:00:00/2' was found to cause an issue. c-ares only uses this function internally for configuration purposes, however external usage for other purposes may cause more severe issues. CVE-2023-32067 Target resolver may erroneously interprets a malformed UDP packet with a lenght of 0 as a graceful shutdown of the connection, which could cause a denial of service.
Product: |
libc-ares2 |
libc-ares-dev |