OESA-2023-1359

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1359
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1359.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1359
Upstream
Published
2023-06-17T11:05:25Z
Modified
2025-08-12T05:20:04.526024Z
Summary
c-ares security update
Details

This is c-ares, an asynchronous resolver library. It is intended for applications which need to perform DNS queries without blocking, or need to perform multiple

Security Fix(es):

c-ares is an asynchronous resolver library. aresinetnetpton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via aressetsortlist(). However, users may externally use aresinetnetpton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1. (CVE-2023-31130)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS / c-ares

Package

Name
c-ares
Purl
pkg:rpm/openEuler/c-ares&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.1-6.oe2203

Ecosystem specific

{
    "src": [
        "c-ares-1.18.1-6.oe2203.src.rpm"
    ],
    "x86_64": [
        "c-ares-devel-1.18.1-6.oe2203.x86_64.rpm",
        "c-ares-1.18.1-6.oe2203.x86_64.rpm",
        "c-ares-debuginfo-1.18.1-6.oe2203.x86_64.rpm",
        "c-ares-debugsource-1.18.1-6.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "c-ares-debugsource-1.18.1-6.oe2203.aarch64.rpm",
        "c-ares-debuginfo-1.18.1-6.oe2203.aarch64.rpm",
        "c-ares-devel-1.18.1-6.oe2203.aarch64.rpm",
        "c-ares-1.18.1-6.oe2203.aarch64.rpm"
    ],
    "noarch": [
        "c-ares-help-1.18.1-6.oe2203.noarch.rpm"
    ]
}