ELSA-2023-7207

ELSA-2023-7207 - c-ares security update

Type:SECURITY
Severity:MODERATE
Release Date:2023-11-22

Description


[1.13.0-9.1]
- Resolves: RHEL-11931 - Buffer Underwrite in ares_inet_net_pton() [rhel-8.9.0.z]

[1.13.0-9]
- Resolves: rhbz#2238293 - CVE-2020-22217 c-ares: read-heap-buffer-overflow in ares_parse_soa_reply [rhel-8] [rhel-8.9.0.z]


Related CVEs


CVE-2020-22217
CVE-2023-31130

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) c-ares-1.13.0-9.el8_9.1.src.rpm1b211e00d17aede08a31f78d79bdcbaa-ol8_aarch64_baseos_latest
c-ares-1.13.0-9.el8_9.1.src.rpm1b211e00d17aede08a31f78d79bdcbaa-ol8_aarch64_u9_baseos_patch
c-ares-1.13.0-9.el8_9.1.aarch64.rpmce6cd04bbc19245ec10b66a5cb32eeaf-ol8_aarch64_baseos_latest
c-ares-1.13.0-9.el8_9.1.aarch64.rpmce6cd04bbc19245ec10b66a5cb32eeaf-ol8_aarch64_u9_baseos_patch
c-ares-devel-1.13.0-9.el8_9.1.aarch64.rpmfcce6f75f2f107a47c896c374f2b64e4-ol8_aarch64_baseos_latest
c-ares-devel-1.13.0-9.el8_9.1.aarch64.rpmfcce6f75f2f107a47c896c374f2b64e4-ol8_aarch64_u9_baseos_patch
Oracle Linux 8 (x86_64) c-ares-1.13.0-9.el8_9.1.src.rpm1b211e00d17aede08a31f78d79bdcbaa-ol8_x86_64_baseos_latest
c-ares-1.13.0-9.el8_9.1.src.rpm1b211e00d17aede08a31f78d79bdcbaa-ol8_x86_64_u9_baseos_patch
c-ares-1.13.0-9.el8_9.1.i686.rpm5f14db1aa03a1bb41bfa03bd2c52481c-ol8_x86_64_baseos_latest
c-ares-1.13.0-9.el8_9.1.i686.rpm5f14db1aa03a1bb41bfa03bd2c52481c-ol8_x86_64_u9_baseos_patch
c-ares-1.13.0-9.el8_9.1.x86_64.rpm9f0de65a35d4e9bfddd9df709e8812a1-ol8_x86_64_baseos_latest
c-ares-1.13.0-9.el8_9.1.x86_64.rpm9f0de65a35d4e9bfddd9df709e8812a1-ol8_x86_64_u9_baseos_patch
c-ares-devel-1.13.0-9.el8_9.1.i686.rpm58dba221d17ece903582fdd697b836f9-ol8_x86_64_baseos_latest
c-ares-devel-1.13.0-9.el8_9.1.i686.rpm58dba221d17ece903582fdd697b836f9-ol8_x86_64_u9_baseos_patch
c-ares-devel-1.13.0-9.el8_9.1.x86_64.rpm568ea134822e80dfb637b96c3298f04d-ol8_x86_64_baseos_latest
c-ares-devel-1.13.0-9.el8_9.1.x86_64.rpm568ea134822e80dfb637b96c3298f04d-ol8_x86_64_u9_baseos_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete