Login
Newsletter
Werbung

Sicherheit: Denial of Service in c-ares
Aktuelle Meldungen Distributionen
Name: Denial of Service in c-ares
ID: USN-6376-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS
Datum: Mo, 18. September 2023, 22:40
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22217
Applikationen: c-ares

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7166204976189851088==
Content-Language: en-CA
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------AG25nDZVqqGU6ewg0KD6gz1g"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------AG25nDZVqqGU6ewg0KD6gz1g
Content-Type: multipart/mixed;
boundary="------------D4JuzAQI7kBrxqznShqO5iQg";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <9c861412-2c46-3a33-0a50-3231a3a7f236@canonical.com>
Subject: [USN-6376-1] c-ares vulnerability

--------------D4JuzAQI7kBrxqznShqO5iQg
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6376-1
September 18, 2023

c-ares vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

c-ares could be made to crash if it received specially crafted network
traffic.

Software Description:
- c-ares: library for asynchronous name resolution

Details:

It was discovered that c-ares incorrectly parsed certain SOA replies. A
remote attacker could possibly use this issue to cause c-res to crash,
resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
libc-ares2 1.15.0-1ubuntu0.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6376-1
CVE-2020-22217

Package Information:
https://launchpad.net/ubuntu/+source/c-ares/1.15.0-1ubuntu0.4

--------------D4JuzAQI7kBrxqznShqO5iQg--

--------------AG25nDZVqqGU6ewg0KD6gz1g
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=B7Lz
-----END PGP SIGNATURE-----

--------------AG25nDZVqqGU6ewg0KD6gz1g--


--===============7166204976189851088==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============7166204976189851088==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung