|
|
Message-ID: <b65aad61-048f-406c-afa3-3254748c0504@brad-house.com>
Date: Fri, 23 Feb 2024 07:32:30 -0500
From: Brad House <brad@...d-house.com>
To: oss-security@...ts.openwall.com
Subject: c-ares CVE-2024-25629
There is a single security vulnerability in c-ares that has been
released with c-ares 1.27.0.
*CVE-2024-25629 *
Impact
|ares__read_line()|is used to parse local configuration files such
as|/etc/resolv.conf|,|/etc/nsswitch.conf|, the|HOSTALIASES|file, and if
using a c-ares version prior to 1.22.0, the|/etc/hosts|file. If any of
these configuration files has an embedded|NULL|character as the first
character in a new line, it can lead to attempting to read memory prior
to the start of the given buffer which may result in a crash.
Patches
Fixed in c-ares 1.27.0
Workarounds
No workarounds exist.
Credit
Vojtěch Vobr
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.