Security Fix(es):
In aressetsortlist, it calls configsortlist(..., sortstr) to parse the input str and initialize a sortlist configuration. However, aressetsortlist has not any checks about the validity of the input str. It is very easy to create an arbitrary length stack overflow with the unchecked memcpy(ipbuf, str, q-str); and memcpy(ipbufpfx, str, q-str); statements in the configsortlist call, which could potentially cause severe security impact in practical programs.(CVE-2022-4904)
{ "severity": "Medium" }
{ "noarch": [ "c-ares-help-1.18.1-4.oe2203sp1.noarch.rpm" ], "aarch64": [ "c-ares-debuginfo-1.18.1-4.oe2203sp1.aarch64.rpm", "c-ares-1.18.1-4.oe2203sp1.aarch64.rpm", "c-ares-devel-1.18.1-4.oe2203sp1.aarch64.rpm", "c-ares-debugsource-1.18.1-4.oe2203sp1.aarch64.rpm" ], "x86_64": [ "c-ares-1.18.1-4.oe2203sp1.x86_64.rpm", "c-ares-debuginfo-1.18.1-4.oe2203sp1.x86_64.rpm", "c-ares-debugsource-1.18.1-4.oe2203sp1.x86_64.rpm", "c-ares-devel-1.18.1-4.oe2203sp1.x86_64.rpm" ], "src": [ "c-ares-1.18.1-4.oe2203sp1.src.rpm" ] }