drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in c-ares
Name: |
Denial of Service in c-ares |
|
ID: |
USN-6676-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro), Ubuntu 23.10 |
|
Datum: |
Mi, 6. März 2024, 18:08 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629 |
|
Applikationen: |
c-ares |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2030527818777608272== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------RY4HXtjZalUKolMiJ1YCS5yX"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------RY4HXtjZalUKolMiJ1YCS5yX Content-Type: multipart/mixed; boundary="------------dL6dEatl9DlhdGoYf5IWfiQV"; protected-headers="v1" From: Nick Galanis <nick.galanis@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <474c82af-293d-4ae7-81db-8c1635fd0739@canonical.com> Subject: [USN-6676-1] c-ares vulnerability
--------------dL6dEatl9DlhdGoYf5IWfiQV Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6676-1 March 06, 2024
c-ares vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
c-ares could be made to crash if it received specially crafted input.
Software Description: - c-ares: library for asynchronous name resolution
Details:
Vojtěch Vobr discovered that c-ares incorrectly handled user input from local configuration files. An attacker could possibly use this issue to cause a denial of service via application crash.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10: libc-ares2 1.19.1-3ubuntu0.1
Ubuntu 22.04 LTS: libc-ares2 1.18.1-1ubuntu0.22.04.3
Ubuntu 20.04 LTS: libc-ares2 1.15.0-1ubuntu0.5
Ubuntu 18.04 LTS (Available with Ubuntu Pro): libc-ares2 1.14.0-1ubuntu0.2+esm2
Ubuntu 16.04 LTS (Available with Ubuntu Pro): libc-ares2 1.10.0-3ubuntu0.2+esm3
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6676-1 CVE-2024-25629
Package Information: https://launchpad.net/ubuntu/+source/c-ares/1.19.1-3ubuntu0.1 https://launchpad.net/ubuntu/+source/c-ares/1.18.1-1ubuntu0.22.04.3 https://launchpad.net/ubuntu/+source/c-ares/1.15.0-1ubuntu0.5
--------------dL6dEatl9DlhdGoYf5IWfiQV--
--------------RY4HXtjZalUKolMiJ1YCS5yX Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmXoVJQFAwAAAAAACgkQ7Dtram9gyMOq DAgAtk2vI9gy09093bXShIQoCz5NaRfEJQ/nAahRBcQuDxPRr7BU+zz+u4Zr/lsDgFbzuS6uSNRR as0fymEeWlz6krV8bOQzKuRtpF70gpj5MhTB+E61YyBST7tQJ1YPGg/n4qf5ALOB2E64sRdxtM2t pe3G1KZNRaQ445DwbDOL1i1M6W4lvRUW8h7+avyIcKk98YxDMVxFpwrTNYg8tIzMhUIkZIS16PXb 0MkcvB0Dxli6tlvRS8OjM0ZtcpFdI++XiCuzBETBTSG3ygzKbsDmWk3/RivIBrxhUcJ2S5jJkm9W 1L0yvVEIqE87rlHIGIhO9zpEF7runEU6a328mROxsw== =zh7X -----END PGP SIGNATURE-----
--------------RY4HXtjZalUKolMiJ1YCS5yX--
--===============2030527818777608272== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============2030527818777608272==--
|
|
|
|