Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b65aad61-048f-406c-afa3-3254748c0504@brad-house.com>
Date: Fri, 23 Feb 2024 07:32:30 -0500
From: Brad House <brad@...d-house.com>
To: oss-security@...ts.openwall.com
Subject: c-ares CVE-2024-25629

There is a single security vulnerability in c-ares that has been 
released with c-ares 1.27.0.

*CVE-2024-25629 *


      Impact

|ares__read_line()|is used to parse local configuration files such 
as|/etc/resolv.conf|,|/etc/nsswitch.conf|, the|HOSTALIASES|file, and if 
using a c-ares version prior to 1.22.0, the|/etc/hosts|file. If any of 
these configuration files has an embedded|NULL|character as the first 
character in a new line, it can lead to attempting to read memory prior 
to the start of the given buffer which may result in a crash.


      Patches

Fixed in c-ares 1.27.0


      Workarounds

No workarounds exist.


      Credit

Vojtěch Vobr

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.