aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJean-Pierre Giraud <jean-pierregiraud@neuf.fr>2023-06-07 09:05:41 +0200
committerJean-Pierre Giraud <jean-pierregiraud@neuf.fr>2023-06-07 09:05:41 +0200
commitfebe4f74db24ecb7f868f3dc12ec713f8f748a3f (patch)
tree5931b960a7fd4eca82496857a7bf4106914c5119
parent873e7c970836da5d8036e1ce10e203637060ce4b (diff)
[SECURITY] [DSA 5419-1] c-ares security update
-rw-r--r--english/security/2023/dsa-5419.data13
-rw-r--r--english/security/2023/dsa-5419.wml37
2 files changed, 50 insertions, 0 deletions
diff --git a/english/security/2023/dsa-5419.data b/english/security/2023/dsa-5419.data
new file mode 100644
index 00000000000..522570eb60b
--- /dev/null
+++ b/english/security/2023/dsa-5419.data
@@ -0,0 +1,13 @@
+<define-tag pagetitle>DSA-5419-1 c-ares</define-tag>
+<define-tag report_date>2023-6-07</define-tag>
+<define-tag secrefs>CVE-2023-31130 CVE-2023-32067</define-tag>
+<define-tag packages>c-ares</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
+
+
+</dl>
diff --git a/english/security/2023/dsa-5419.wml b/english/security/2023/dsa-5419.wml
new file mode 100644
index 00000000000..fc6df557c39
--- /dev/null
+++ b/english/security/2023/dsa-5419.wml
@@ -0,0 +1,37 @@
+<define-tag description>security update</define-tag>
+<define-tag moreinfo>
+<p>Two vunerabilities were discovered in c-ares, an asynchronous name
+resolver library:</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31130">CVE-2023-31130</a>
+
+ <p>ares_inet_net_pton() is found to be vulnerable to a buffer underflow
+ for certain ipv6 addresses, in particular "0::00:00:00/2" was found
+ to cause an issue. c-ares only uses this function internally for
+ configuration purposes, however external usage for other purposes may
+ cause more severe issues.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32067">CVE-2023-32067</a>
+
+ <p>Target resolver may erroneously interprets a malformed UDP packet
+ with a lenght of 0 as a graceful shutdown of the connection, which
+ could cause a denial of service.</p></li>
+
+</ul>
+
+<p>For the stable distribution (bullseye), these problems have been fixed in
+version 1.17.1-1+deb11u3.</p>
+
+<p>We recommend that you upgrade your c-ares packages.</p>
+
+<p>For the detailed security status of c-ares please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/c-ares">\
+https://security-tracker.debian.org/tracker/c-ares</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2023/dsa-5419.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy