ELSA-2023-7116

ELSA-2023-7116 - c-ares security update

Type:SECURITY
Severity:MODERATE
Release Date:2023-11-17

Description


[1.13.0-8]
- Resolves: rhbz#2209517 - CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service [rhel-8.9.0]

[1.13.0-7]
- Resolves: rhbz#2170867 - c-ares: buffer overflow in config_sortlist() due to missing string length check [rhel-8]


Related CVEs


CVE-2022-4904

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) c-ares-1.13.0-8.el8.src.rpme00796d9d26224ea906bb15535add8fc-ol8_aarch64_baseos_latest
c-ares-1.13.0-8.el8.src.rpme00796d9d26224ea906bb15535add8fc-ol8_aarch64_u9_baseos_base
c-ares-1.13.0-8.el8.aarch64.rpmdd8c8855817b7a0f5b3815a90aea5fb1-ol8_aarch64_baseos_latest
c-ares-1.13.0-8.el8.aarch64.rpmdd8c8855817b7a0f5b3815a90aea5fb1-ol8_aarch64_u9_baseos_base
c-ares-devel-1.13.0-8.el8.aarch64.rpmec792a4377bf482118ca877a29f5f3a0-ol8_aarch64_baseos_latest
c-ares-devel-1.13.0-8.el8.aarch64.rpmec792a4377bf482118ca877a29f5f3a0-ol8_aarch64_u9_baseos_base
Oracle Linux 8 (x86_64) c-ares-1.13.0-8.el8.src.rpme00796d9d26224ea906bb15535add8fc-ol8_x86_64_baseos_latest
c-ares-1.13.0-8.el8.src.rpme00796d9d26224ea906bb15535add8fc-ol8_x86_64_u9_baseos_base
c-ares-1.13.0-8.el8.i686.rpm2884d45a9ae8aeec33bdf3171dc7b1ad-ol8_x86_64_baseos_latest
c-ares-1.13.0-8.el8.i686.rpm2884d45a9ae8aeec33bdf3171dc7b1ad-ol8_x86_64_u9_baseos_base
c-ares-1.13.0-8.el8.x86_64.rpm50d46fa27cc8407750a1ec1c3ce6ff5c-ol8_x86_64_baseos_latest
c-ares-1.13.0-8.el8.x86_64.rpm50d46fa27cc8407750a1ec1c3ce6ff5c-ol8_x86_64_u9_baseos_base
c-ares-devel-1.13.0-8.el8.i686.rpm8d29e0a00028a3fe47a8fe45b8acce47-ol8_x86_64_baseos_latest
c-ares-devel-1.13.0-8.el8.i686.rpm8d29e0a00028a3fe47a8fe45b8acce47-ol8_x86_64_u9_baseos_base
c-ares-devel-1.13.0-8.el8.x86_64.rpmc45a49321b055b1a6a09f30701c2de0b-ol8_x86_64_baseos_latest
c-ares-devel-1.13.0-8.el8.x86_64.rpmc45a49321b055b1a6a09f30701c2de0b-ol8_x86_64_u9_baseos_base



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete