A flaw was found in the c-ares package. The aressetsortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libc-ares-dev", "binary_version": "1.14.0-1ubuntu0.2" }, { "binary_name": "libc-ares2", "binary_version": "1.14.0-1ubuntu0.2" }, { "binary_name": "libc-ares2-dbgsym", "binary_version": "1.14.0-1ubuntu0.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libc-ares-dev", "binary_version": "1.15.0-1ubuntu0.2" }, { "binary_name": "libc-ares2", "binary_version": "1.15.0-1ubuntu0.2" }, { "binary_name": "libc-ares2-dbgsym", "binary_version": "1.15.0-1ubuntu0.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libc-ares-dev", "binary_version": "1.18.1-1ubuntu0.22.04.1" }, { "binary_name": "libc-ares2", "binary_version": "1.18.1-1ubuntu0.22.04.1" }, { "binary_name": "libc-ares2-dbgsym", "binary_version": "1.18.1-1ubuntu0.22.04.1" } ] }