Login
Newsletter
Werbung

Sicherheit: Denial of Service in c-ares
Aktuelle Meldungen Distributionen
Name: Denial of Service in c-ares
ID: USN-6676-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro), Ubuntu 23.10
Datum: Mi, 6. März 2024, 18:08
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629
Applikationen: c-ares

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2030527818777608272==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------RY4HXtjZalUKolMiJ1YCS5yX"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------RY4HXtjZalUKolMiJ1YCS5yX
Content-Type: multipart/mixed;
boundary="------------dL6dEatl9DlhdGoYf5IWfiQV";
protected-headers="v1"
From: Nick Galanis <nick.galanis@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <474c82af-293d-4ae7-81db-8c1635fd0739@canonical.com>
Subject: [USN-6676-1] c-ares vulnerability

--------------dL6dEatl9DlhdGoYf5IWfiQV
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6676-1
March 06, 2024

c-ares vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

c-ares could be made to crash if it received specially crafted
input.

Software Description:
- c-ares: library for asynchronous name resolution

Details:

Vojtěch Vobr discovered that c-ares incorrectly handled user input from
local configuration files. An attacker could possibly use this issue to
cause a denial of service via application crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libc-ares2 1.19.1-3ubuntu0.1

Ubuntu 22.04 LTS:
libc-ares2 1.18.1-1ubuntu0.22.04.3

Ubuntu 20.04 LTS:
libc-ares2 1.15.0-1ubuntu0.5

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libc-ares2 1.14.0-1ubuntu0.2+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libc-ares2 1.10.0-3ubuntu0.2+esm3

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6676-1
CVE-2024-25629

Package Information:
https://launchpad.net/ubuntu/+source/c-ares/1.19.1-3ubuntu0.1
https://launchpad.net/ubuntu/+source/c-ares/1.18.1-1ubuntu0.22.04.3
https://launchpad.net/ubuntu/+source/c-ares/1.15.0-1ubuntu0.5

--------------dL6dEatl9DlhdGoYf5IWfiQV--

--------------RY4HXtjZalUKolMiJ1YCS5yX
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmXoVJQFAwAAAAAACgkQ7Dtram9gyMOq
DAgAtk2vI9gy09093bXShIQoCz5NaRfEJQ/nAahRBcQuDxPRr7BU+zz+u4Zr/lsDgFbzuS6uSNRR
as0fymEeWlz6krV8bOQzKuRtpF70gpj5MhTB+E61YyBST7tQJ1YPGg/n4qf5ALOB2E64sRdxtM2t
pe3G1KZNRaQ445DwbDOL1i1M6W4lvRUW8h7+avyIcKk98YxDMVxFpwrTNYg8tIzMhUIkZIS16PXb
0MkcvB0Dxli6tlvRS8OjM0ZtcpFdI++XiCuzBETBTSG3ygzKbsDmWk3/RivIBrxhUcJ2S5jJkm9W
1L0yvVEIqE87rlHIGIhO9zpEF7runEU6a328mROxsw==
=zh7X
-----END PGP SIGNATURE-----

--------------RY4HXtjZalUKolMiJ1YCS5yX--


--===============2030527818777608272==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============2030527818777608272==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung