Security Fix(es):
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.(CVE-2023-32067)
{ "severity": "High" }
{ "src": [ "c-ares-1.16.1-6.oe1.src.rpm" ], "x86_64": [ "c-ares-1.16.1-6.oe1.x86_64.rpm", "c-ares-debugsource-1.16.1-6.oe1.x86_64.rpm", "c-ares-devel-1.16.1-6.oe1.x86_64.rpm", "c-ares-debuginfo-1.16.1-6.oe1.x86_64.rpm" ], "aarch64": [ "c-ares-devel-1.16.1-6.oe1.aarch64.rpm", "c-ares-debuginfo-1.16.1-6.oe1.aarch64.rpm", "c-ares-1.16.1-6.oe1.aarch64.rpm", "c-ares-debugsource-1.16.1-6.oe1.aarch64.rpm" ], "noarch": [ "c-ares-help-1.16.1-6.oe1.noarch.rpm" ] }