|
Message-ID: <b65aad61-048f-406c-afa3-3254748c0504@brad-house.com> Date: Fri, 23 Feb 2024 07:32:30 -0500 From: Brad House <brad@...d-house.com> To: oss-security@...ts.openwall.com Subject: c-ares CVE-2024-25629 There is a single security vulnerability in c-ares that has been released with c-ares 1.27.0. *CVE-2024-25629 * Impact |ares__read_line()|is used to parse local configuration files such as|/etc/resolv.conf|,|/etc/nsswitch.conf|, the|HOSTALIASES|file, and if using a c-ares version prior to 1.22.0, the|/etc/hosts|file. If any of these configuration files has an embedded|NULL|character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. Patches Fixed in c-ares 1.27.0 Workarounds No workarounds exist. Credit Vojtěch Vobr
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.