Количество 29
Количество 29

RLSA-2023:7207
Moderate: c-ares security update
ELSA-2023-7207
ELSA-2023-7207: c-ares security update (MODERATE)

CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.

CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.

CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.

CVE-2020-22217
CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via ...

CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

CVE-2023-31130
CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vu ...

SUSE-SU-2023:3690-1
Security update for libcares2
GHSA-88q4-8vpj-fqpg
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.

BDU:2023-05898
Уязвимость функции ares_parse_soa_reply() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

BDU:2023-07647
Уязвимость функции ares_inet_net_pton() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240404-02
Множественные уязвимости c-ares

SUSE-SU-2023:2477-1
Security update for libcares2

SUSE-SU-2023:2313-1
Security update for c-ares
ELSA-2023-6635
ELSA-2023-6635: c-ares security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2023:7207 Moderate: c-ares security update | больше 1 года назад | ||
ELSA-2023-7207 ELSA-2023-7207: c-ares security update (MODERATE) | больше 1 года назад | |||
![]() | CVE-2020-22217 Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
![]() | CVE-2020-22217 Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
![]() | CVE-2020-22217 Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 5.9 | 0% Низкий | 5 месяцев назад | |
CVE-2020-22217 Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via ... | CVSS3: 5.9 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-31130 c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1. | CVSS3: 4.1 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-31130 c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1. | CVSS3: 5.7 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-31130 c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1. | CVSS3: 4.1 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 6.4 | 0% Низкий | 2 месяца назад | |
CVE-2023-31130 c-ares is an asynchronous resolver library. ares_inet_net_pton() is vu ... | CVSS3: 4.1 | 0% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:3690-1 Security update for libcares2 | 0% Низкий | почти 2 года назад | |
GHSA-88q4-8vpj-fqpg Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c. | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-05898 Уязвимость функции ares_parse_soa_reply() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 9.8 | 0% Низкий | около 5 лет назад |
![]() | BDU:2023-07647 Уязвимость функции ares_inet_net_pton() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 6.4 | 0% Низкий | около 2 лет назад |
![]() | ROS-20240404-02 Множественные уязвимости c-ares | CVSS3: 6.4 | около 1 года назад | |
![]() | SUSE-SU-2023:2477-1 Security update for libcares2 | около 2 лет назад | ||
![]() | SUSE-SU-2023:2313-1 Security update for c-ares | около 2 лет назад | ||
ELSA-2023-6635 ELSA-2023-6635: c-ares security, bug fix, and enhancement update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу